Loading ...

Play interactive tourEdit tour

Windows Analysis Report https://archive.org/download/MCOPY/MCOPY.tar

Overview

General Information

Sample URL:https://archive.org/download/MCOPY/MCOPY.tar
Analysis ID:447280
Infos:

Most interesting Screenshot:

Detection

MailPassView
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Yara detected MailPassView
Machine Learning detection for dropped file
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file access)
Tries to steal Mail credentials (via file registry)
Yara detected WebBrowserPassView password recovery tool
Antivirus or Machine Learning detection for unpacked file
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains strange resources
Potential browser exploit detected (process start blacklist hit)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

Process Tree

  • System is w10x64
  • iexplore.exe (PID: 2332 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 1808 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2332 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
    • unarchiver.exe (PID: 4448 cmdline: 'C:\Windows\SysWOW64\unarchiver.exe' 'C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\MCOPY.tar' MD5: DB55139D9DD29F24AE8EA8F0E5606901)
      • 7za.exe (PID: 4600 cmdline: 'C:\Windows\System32\7za.exe' x -pinfected -y -o'C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x' 'C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\MCOPY.tar' MD5: 77E556CDFDC5C592F5C46DB4127C6F4C)
        • conhost.exe (PID: 4232 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • cmd.exe (PID: 5776 cmdline: 'cmd.exe' /C 'C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
        • conhost.exe (PID: 3868 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • RJCGQP.exe (PID: 1488 cmdline: C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exe MD5: AD4B4A3179D923A637CEB9AC2E1CB00A)
          • cmd.exe (PID: 5504 cmdline: C:\Windows\system32\cmd.exe /c A.exe /stext A.txt MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 6084 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
            • A.exe (PID: 5804 cmdline: A.exe /stext A.txt MD5: 8104093918B6F2D2004535B24B1533BA)
          • cmd.exe (PID: 4560 cmdline: C:\Windows\system32\cmd.exe /c B.exe /stext B.txt MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 4556 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
            • B.exe (PID: 2396 cmdline: B.exe /stext B.txt MD5: 62B2864C32CB33F57A65F47269D91BE4)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmpJoeSecurity_MailPassViewYara detected MailPassViewJoe Security
    0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmpJoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security
      Process Memory Space: A.exe PID: 5804JoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security
        Process Memory Space: B.exe PID: 2396JoeSecurity_MailPassViewYara detected MailPassViewJoe Security

          Unpacked PEs

          SourceRuleDescriptionAuthorStrings
          24.2.B.exe.400000.0.unpackJoeSecurity_MailPassViewYara detected MailPassViewJoe Security
            15.2.A.exe.400000.0.unpackJoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security

              Sigma Overview

              No Sigma rule has matched

              Jbx Signature Overview

              Click to jump to signature section

              Show All Signature Results

              AV Detection:

              barindex
              Antivirus detection for dropped fileShow sources
              Source: C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exeAvira: detection malicious, Label: DR/AutoIt.Gen8
              Multi AV Scanner detection for dropped fileShow sources
              Source: C:\Users\user\AppData\Local\Temp\A.exeMetadefender: Detection: 32%Perma Link
              Source: C:\Users\user\AppData\Local\Temp\A.exeReversingLabs: Detection: 79%
              Source: C:\Users\user\AppData\Local\Temp\B.exeMetadefender: Detection: 28%Perma Link
              Source: C:\Users\user\AppData\Local\Temp\B.exeReversingLabs: Detection: 72%
              Source: C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exeReversingLabs: Detection: 47%
              Machine Learning detection for dropped fileShow sources
              Source: C:\Users\user\AppData\Local\Temp\A.exeJoe Sandbox ML: detected
              Source: C:\Users\user\AppData\Local\Temp\B.exeJoe Sandbox ML: detected
              Source: 12.0.RJCGQP.exe.1330000.0.unpackAvira: Label: DR/AutoIt.Gen8
              Source: 12.2.RJCGQP.exe.1330000.0.unpackAvira: Label: DR/AutoIt.Gen8
              Source: 12.3.RJCGQP.exe.463ff90.1.unpackAvira: Label: TR/Patched.Ren.Gen
              Source: C:\Users\user\AppData\Local\Temp\A.exeCode function: 15_2_00404423 GetProcAddress,FreeLibrary,CryptUnprotectData,15_2_00404423
              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
              Source: unknownHTTPS traffic detected: 207.241.224.2:443 -> 192.168.2.3:49724 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 207.241.224.2:443 -> 192.168.2.3:49725 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 207.241.228.150:443 -> 192.168.2.3:49726 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 207.241.228.150:443 -> 192.168.2.3:49727 version: TLS 1.2
              Source: Binary string: -T'.pdbB source: RJCGQP.exe, 0000000C.00000003.304592497.0000000004611000.00000004.00000001.sdmp, B.exe.12.dr
              Source: Binary string: c:\Projects\VS2005\WebBrowserPassView\Command-Line\WebBrowserPassView.pdb source: A.exe
              Source: Binary string: c:\Projects\VS2005\mailpv\Command-Line\mailpv.pdb source: B.exe
              Source: C:\Users\user\AppData\Local\Temp\A.exeCode function: 15_2_0040AE51 FindFirstFileW,FindNextFileW,15_2_0040AE51
              Source: C:\Users\user\AppData\Local\Temp\B.exeCode function: 24_2_00407C87 FindFirstFileA,FindNextFileA,strlen,strlen,24_2_00407C87
              Source: C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exeFile opened: C:\Users\userJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exeFile opened: C:\Users\user\AppDataJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exeFile opened: C:\Users\user\AppData\Local\Temp\fyhuigp3.w2xJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exeFile opened: C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exeJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
              Source: C:\Windows\SysWOW64\unarchiver.exeCode function: 4x nop then jmp 0536099Bh7_2_053602A8
              Source: C:\Windows\SysWOW64\unarchiver.exeCode function: 4x nop then jmp 0536099Ah7_2_053602A8
              Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Windows\SysWOW64\unarchiver.exe
              Source: A.exe, 0000000F.00000003.288196887.0000000000B0B000.00000004.00000040.sdmpString found in binary or memory: /MCOPY/MCOPY.tarhttps://go.microsoft.com/fwlink/?LinkId=838604https://go.microsoft.com/fwlink/https://go.microsoft.com/fwlink/p/?LinkId=255141https://go.microsoft.com/fwlink/p/https://go.microsoft.com/fwlink/?LinkId=517287res://C:\Windows\system32\mmcndmgr.dll/views.htmhttp://www.msn.com/?ocid=iehphttp://www.msn.com/http://www.msn.com/de-ch/?ocid=iehphttp://www.msn.com/de-ch/http://go.microsoft.com/fwlink/?LinkId=838604http://go.microsoft.com/fwlink/http://go.microsoft.com/fwlink/p/?LinkId=255141http://go.microsoft.com/fwlink/p/https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
              Source: A.exe, 0000000F.00000003.288196887.0000000000B0B000.00000004.00000040.sdmpString found in binary or memory: /MCOPY/MCOPY.tarhttps://go.microsoft.com/fwlink/?LinkId=838604https://go.microsoft.com/fwlink/https://go.microsoft.com/fwlink/p/?LinkId=255141https://go.microsoft.com/fwlink/p/https://go.microsoft.com/fwlink/?LinkId=517287res://C:\Windows\system32\mmcndmgr.dll/views.htmhttp://www.msn.com/?ocid=iehphttp://www.msn.com/http://www.msn.com/de-ch/?ocid=iehphttp://www.msn.com/de-ch/http://go.microsoft.com/fwlink/?LinkId=838604http://go.microsoft.com/fwlink/http://go.microsoft.com/fwlink/p/?LinkId=255141http://go.microsoft.com/fwlink/p/https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
              Source: A.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
              Source: A.exe, 0000000F.00000003.288143825.0000000000B0A000.00000004.00000040.sdmpString found in binary or memory: s://www.microsoft.com/en-us/welcomeie11/https://www.microsoft.com/en-us/edge?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edgehttps://www.microsoft.com/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/edge/https://www.microsoft.com/en-us/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edge/https://www.google.com/chrome/https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0https://www.google.com/chrome/thank-you.htmlhttps://www.bing.com/search?q=chrome+download&src=IE-SearchBox&FORM=IESR4A&pc=EUPP_https://www.bing.com/searchhttps://ia801500.us.archive.org/0/items/MCOPY/MCOPY.tarhttps://go.microsoft.com/fwlink/?LinkId=838604https://go.microsoft.com/fwlink/https://go.microsoft.com/fwlink/p/?LinkId=255141https://go.microsoft.com/fwlink/p/https://go.microsoft.com/fwlink/?LinkId=517287res://C:\Windows\system32\mmcndmgr.dll/views.htmhttp://www.msn.com/?ocid=iehphttp://www.msn.com/http://www.msn.com/de-ch/?ocid=iehphttp://www.msn.com/de-ch/http://go.microsoft.com/fwlink/?LinkId=838604http://go.microsoft.com/fwlink/http://go.microsoft.com/fwlink/p/?LinkId=255141http://go.microsoft.com/fwlink/p/https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
              Source: A.exe, 0000000F.00000003.288143825.0000000000B0A000.00000004.00000040.sdmpString found in binary or memory: s://www.microsoft.com/en-us/welcomeie11/https://www.microsoft.com/en-us/edge?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edgehttps://www.microsoft.com/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/edge/https://www.microsoft.com/en-us/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edge/https://www.google.com/chrome/https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0https://www.google.com/chrome/thank-you.htmlhttps://www.bing.com/search?q=chrome+download&src=IE-SearchBox&FORM=IESR4A&pc=EUPP_https://www.bing.com/searchhttps://ia801500.us.archive.org/0/items/MCOPY/MCOPY.tarhttps://go.microsoft.com/fwlink/?LinkId=838604https://go.microsoft.com/fwlink/https://go.microsoft.com/fwlink/p/?LinkId=255141https://go.microsoft.com/fwlink/p/https://go.microsoft.com/fwlink/?LinkId=517287res://C:\Windows\system32\mmcndmgr.dll/views.htmhttp://www.msn.com/?ocid=iehphttp://www.msn.com/http://www.msn.com/de-ch/?ocid=iehphttp://www.msn.com/de-ch/http://go.microsoft.com/fwlink/?LinkId=838604http://go.microsoft.com/fwlink/http://go.microsoft.com/fwlink/p/?LinkId=255141http://go.microsoft.com/fwlink/p/https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
              Source: A.exe, 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
              Source: A.exe, 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
              Source: unknownDNS traffic detected: queries for: archive.org
              Source: A.exe, 0000000F.00000002.288412108.0000000000193000.00000004.00000001.sdmpString found in binary or memory: http://www.nirsoft.net
              Source: A.exe, B.exe, B.exe, 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmpString found in binary or memory: http://www.nirsoft.net/
              Source: RJCGQP.exe, 0000000C.00000002.328333475.0000000001185000.00000004.00000001.sdmpString found in binary or memory: https://cookforme.ch/routes/networks/
              Source: A.exe, 0000000F.00000003.287476980.00000000022D1000.00000004.00000001.sdmpString found in binary or memory: https://helpx.adobe.c
              Source: A.exeString found in binary or memory: https://login.yahoo.com/config/login
              Source: A.exe, 0000000F.00000002.289487853.00000000022EA000.00000004.00000001.sdmpString found in binary or memory: https://support.google.com/chrome/answer/6258784
              Source: A.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
              Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
              Source: unknownHTTPS traffic detected: 207.241.224.2:443 -> 192.168.2.3:49724 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 207.241.224.2:443 -> 192.168.2.3:49725 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 207.241.228.150:443 -> 192.168.2.3:49726 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 207.241.228.150:443 -> 192.168.2.3:49727 version: TLS 1.2
              Source: C:\Users\user\AppData\Local\Temp\B.exeCode function: 24_2_0040C084 OpenClipboard,24_2_0040C084
              Source: unarchiver.exe, 00000007.00000002.330804685.000000000128B000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
              Source: C:\Users\user\AppData\Local\Temp\A.exeCode function: 15_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,15_2_0040DD85
              Source: C:\Users\user\AppData\Local\Temp\B.exeCode function: 24_2_004016FC NtdllDefWindowProc_A,24_2_004016FC
              Source: C:\Users\user\AppData\Local\Temp\B.exeCode function: 24_2_004017B6 NtdllDefWindowProc_A,24_2_004017B6
              Source: C:\Windows\SysWOW64\unarchiver.exeCode function: 7_2_053602A87_2_053602A8
              Source: C:\Windows\SysWOW64\unarchiver.exeCode function: 7_2_053602997_2_05360299
              Source: C:\Users\user\AppData\Local\Temp\A.exeCode function: 15_2_0044B04015_2_0044B040
              Source: C:\Users\user\AppData\Local\Temp\A.exeCode function: 15_2_0043610D15_2_0043610D
              Source: C:\Users\user\AppData\Local\Temp\A.exeCode function: 15_2_0044731015_2_00447310
              Source: C:\Users\user\AppData\Local\Temp\A.exeCode function: 15_2_0044A49015_2_0044A490
              Source: C:\Users\user\AppData\Local\Temp\A.exeCode function: 15_2_0040755A15_2_0040755A
              Source: C:\Users\user\AppData\Local\Temp\A.exeCode function: 15_2_0043C56015_2_0043C560
              Source: C:\Users\user\AppData\Local\Temp\B.exeCode function: 24_2_0040D04424_2_0040D044
              Source: C:\Users\user\AppData\Local\Temp\B.exeCode function: 24_2_0040503824_2_00405038
              Source: C:\Users\user\AppData\Local\Temp\B.exeCode function: 24_2_004050A924_2_004050A9
              Source: C:\Users\user\AppData\Local\Temp\B.exeCode function: 24_2_0040511A24_2_0040511A
              Source: C:\Users\user\AppData\Local\Temp\B.exeCode function: 24_2_004051AB24_2_004051AB
              Source: C:\Users\user\AppData\Local\Temp\B.exeCode function: 24_2_004382F324_2_004382F3
              Source: C:\Users\user\AppData\Local\Temp\B.exeCode function: 24_2_0043057524_2_00430575
              Source: C:\Users\user\AppData\Local\Temp\B.exeCode function: 24_2_0043B67124_2_0043B671
              Source: C:\Users\user\AppData\Local\Temp\B.exeCode function: 24_2_0041F6CD24_2_0041F6CD
              Source: C:\Users\user\AppData\Local\Temp\B.exeCode function: 24_2_004119CF24_2_004119CF
              Source: C:\Users\user\AppData\Local\Temp\B.exeCode function: 24_2_00439B1124_2_00439B11
              Source: C:\Users\user\AppData\Local\Temp\B.exeCode function: 24_2_00438E5424_2_00438E54
              Source: C:\Users\user\AppData\Local\Temp\B.exeCode function: 24_2_00412F6724_2_00412F67
              Source: C:\Users\user\AppData\Local\Temp\B.exeCode function: 24_2_0043CF1824_2_0043CF18
              Source: C:\Users\user\AppData\Local\Temp\B.exeCode function: String function: 00412968 appears 78 times
              Source: C:\Users\user\AppData\Local\Temp\B.exeCode function: String function: 0044407A appears 37 times
              Source: C:\Users\user\AppData\Local\Temp\B.exeCode function: String function: 00421A32 appears 43 times
              Source: C:\Users\user\AppData\Local\Temp\A.exeCode function: String function: 004169A7 appears 37 times
              Source: A.exe.12.drStatic PE information: Resource name: RT_STRING type: COM executable for DOS
              Source: A.exe.12.drStatic PE information: Resource name: RT_STRING type: PDP-11 overlaid separate executable not stripped
              Source: RJCGQP.exe.8.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
              Source: RJCGQP.exe.8.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
              Source: B.exe.12.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
              Source: A.exe.12.drStatic PE information: Section: UPX1 ZLIB complexity 0.992298054245
              Source: B.exe.12.drStatic PE information: Section: UPX1 ZLIB complexity 0.990766088275
              Source: classification engineClassification label: mal88.phis.troj.spyw.win@23/15@2/3
              Source: C:\Users\user\AppData\Local\Temp\A.exeCode function: 15_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,??3@YAXPAX@Z,15_2_004182CE
              Source: C:\Users\user\AppData\Local\Temp\A.exeCode function: 15_2_00418758 GetDiskFreeSpaceW,GetDiskFreeSpaceA,??3@YAXPAX@Z,15_2_00418758
              Source: C:\Users\user\AppData\Local\Temp\A.exeCode function: 15_2_00413D4C CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,CloseHandle,??3@YAXPAX@Z,Process32NextW,CloseHandle,15_2_00413D4C
              Source: C:\Users\user\AppData\Local\Temp\A.exeCode function: 15_2_0040B58D GetModuleHandleW,FindResourceW,LoadResource,SizeofResource,LockResource,memcpy,15_2_0040B58D
              Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\HighJump to behavior
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4232:120:WilError_01
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3868:120:WilError_01
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6084:120:WilError_01
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4556:120:WilError_01
              Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DF10E708BDA7DE05C8.TMPJump to behavior
              Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dllJump to behavior
              Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
              Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\A.exeSystem information queried: HandleInformationJump to behavior
              Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Windows\SysWOW64\unarchiver.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: A.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
              Source: A.exe, B.exeBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
              Source: A.exe, 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
              Source: A.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
              Source: A.exeBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
              Source: A.exeBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
              Source: A.exeBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
              Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
              Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2332 CREDAT:17410 /prefetch:2
              Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Windows\SysWOW64\unarchiver.exe 'C:\Windows\SysWOW64\unarchiver.exe' 'C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\MCOPY.tar'
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\7za.exe 'C:\Windows\System32\7za.exe' x -pinfected -y -o'C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x' 'C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\MCOPY.tar'
              Source: C:\Windows\SysWOW64\7za.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'cmd.exe' /C 'C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exe'
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exe C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exe
              Source: C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c A.exe /stext A.txt
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\A.exe A.exe /stext A.txt
              Source: C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c B.exe /stext B.txt
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\B.exe B.exe /stext B.txt
              Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2332 CREDAT:17410 /prefetch:2Jump to behavior
              Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Windows\SysWOW64\unarchiver.exe 'C:\Windows\SysWOW64\unarchiver.exe' 'C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\MCOPY.tar'Jump to behavior
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\7za.exe 'C:\Windows\System32\7za.exe' x -pinfected -y -o'C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x' 'C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\MCOPY.tar'Jump to behavior
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'cmd.exe' /C 'C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exe'Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exe C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exeJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c A.exe /stext A.txtJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c B.exe /stext B.txtJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\A.exe A.exe /stext A.txtJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\B.exe B.exe /stext B.txtJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\A.exeFile opened: C:\Users\user\AppData\Local\Temp\A.cfgJump to behavior
              Source: C:\Program Files\internet explorer\iexplore.exeAutomated click: Run
              Source: C:\Program Files\internet explorer\iexplore.exeAutomated click: Run
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Users\user\AppData\Local\Temp\B.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
              Source: Binary string: -T'.pdbB source: RJCGQP.exe, 0000000C.00000003.304592497.0000000004611000.00000004.00000001.sdmp, B.exe.12.dr
              Source: Binary string: c:\Projects\VS2005\WebBrowserPassView\Command-Line\WebBrowserPassView.pdb source: A.exe
              Source: Binary string: c:\Projects\VS2005\mailpv\Command-Line\mailpv.pdb source: B.exe
              Source: C:\Users\user\AppData\Local\Temp\A.exeCode function: 15_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,7078DB20,MessageBoxW,15_2_004044A4
              Source: C:\Users\user\AppData\Local\Temp\B.exeCode function: 24_2_00444355 push ecx; ret 24_2_00444365
              Source: C:\Users\user\AppData\Local\Temp\B.exeCode function: 24_2_004446D0 push eax; ret 24_2_004446E4
              Source: C:\Users\user\AppData\Local\Temp\B.exeCode function: 24_2_004446D0 push eax; ret 24_2_0044470C
              Source: C:\Users\user\AppData\Local\Temp\B.exeCode function: 24_2_0044AC84 push eax; ret 24_2_0044AC91
              Source: initial sampleStatic PE information: section name: UPX0
              Source: initial sampleStatic PE information: section name: UPX1
              Source: initial sampleStatic PE information: section name: UPX0
              Source: initial sampleStatic PE information: section name: UPX1
              Source: C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exeFile created: C:\Users\user\AppData\Local\Temp\B.exeJump to dropped file
              Source: C:\Windows\SysWOW64\7za.exeFile created: C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exeFile created: C:\Users\user\AppData\Local\Temp\A.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\B.exeCode function: 24_2_004047C6 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,24_2_004047C6
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\A.exeCode function: 15_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,15_2_0040DD85
              Source: C:\Windows\SysWOW64\unarchiver.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exeWindow / User API: threadDelayed 703Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\B.exeAPI coverage: 9.6 %
              Source: C:\Windows\SysWOW64\unarchiver.exe TID: 5632Thread sleep count: 49 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\unarchiver.exe TID: 5876Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exe TID: 580Thread sleep count: 703 > 30Jump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\AppData\Local\Temp\A.exeCode function: 15_2_0040AE51 FindFirstFileW,FindNextFileW,15_2_0040AE51
              Source: C:\Users\user\AppData\Local\Temp\B.exeCode function: 24_2_00407C87 FindFirstFileA,FindNextFileA,strlen,strlen,24_2_00407C87
              Source: C:\Windows\SysWOW64\unarchiver.exeCode function: 7_2_014AB042 GetSystemInfo,7_2_014AB042
              Source: C:\Windows\SysWOW64\unarchiver.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exeFile opened: C:\Users\userJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exeFile opened: C:\Users\user\AppDataJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exeFile opened: C:\Users\user\AppData\Local\Temp\fyhuigp3.w2xJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exeFile opened: C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exeJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\B.exeAPI call chain: ExitProcess graph end nodegraph_24-33804
              Source: C:\Users\user\AppData\Local\Temp\A.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\A.exeCode function: 15_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,15_2_0040DD85
              Source: C:\Users\user\AppData\Local\Temp\A.exeCode function: 15_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,7078DB20,MessageBoxW,15_2_004044A4
              Source: C:\Windows\SysWOW64\unarchiver.exeMemory allocated: page read and write | page guardJump to behavior
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\7za.exe 'C:\Windows\System32\7za.exe' x -pinfected -y -o'C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x' 'C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\MCOPY.tar'Jump to behavior
              Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'cmd.exe' /C 'C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exe'Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exe C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exeJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\A.exe A.exe /stext A.txtJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\B.exe B.exe /stext B.txtJump to behavior
              Source: RJCGQP.exe, 0000000C.00000000.276472877.00000000013DE000.00000002.00020000.sdmp, MCOPY.tar.nla9uw7.partial.3.drBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndTHISREMOVEblankinfoquestionstopwarning
              Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\B.exeCode function: 24_2_00408043 memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,24_2_00408043
              Source: C:\Users\user\AppData\Local\Temp\A.exeCode function: 15_2_0041739B GetVersionExW,15_2_0041739B
              Source: C:\Windows\SysWOW64\unarchiver.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information:

              barindex
              Yara detected MailPassViewShow sources
              Source: Yara matchFile source: 24.2.B.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: B.exe PID: 2396, type: MEMORY
              Tries to harvest and steal browser information (history, passwords, etc)Show sources
              Source: C:\Users\user\AppData\Local\Temp\A.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\A.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Tries to steal Instant Messenger accounts or passwordsShow sources
              Source: C:\Users\user\AppData\Local\Temp\B.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\B.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
              Tries to steal Mail credentials (via file access)Show sources
              Source: C:\Users\user\AppData\Local\Temp\B.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\B.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\B.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\B.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
              Tries to steal Mail credentials (via file registry)Show sources
              Source: C:\Users\user\AppData\Local\Temp\B.exeCode function: ESMTPPassword24_2_004033E2
              Source: C:\Users\user\AppData\Local\Temp\B.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword24_2_00402DA5
              Source: C:\Users\user\AppData\Local\Temp\B.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword24_2_00402DA5
              Yara detected WebBrowserPassView password recovery toolShow sources
              Source: Yara matchFile source: 15.2.A.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: A.exe PID: 5804, type: MEMORY

              Mitre Att&ck Matrix

              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid AccountsNative API1Application Shimming1Application Shimming1Disable or Modify Tools1OS Credential Dumping1Account Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel22Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default AccountsExploitation for Client Execution1Boot or Logon Initialization ScriptsProcess Injection12Deobfuscate/Decode Files or Information1Input Capture1File and Directory Discovery3Remote Desktop ProtocolData from Local System1Exfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information31Credentials in Registry2System Information Discovery17SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing21Credentials In Files1Security Software Discovery11Distributed Component Object ModelInput Capture1Scheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading1LSA SecretsVirtualization/Sandbox Evasion21SSHClipboard Data1Data Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion21Cached Domain CredentialsProcess Discovery4VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection12DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemSystem Owner/User Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

              Behavior Graph

              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 447280 URL: https://archive.org/downloa... Startdate: 12/07/2021 Architecture: WINDOWS Score: 88 56 Yara detected MailPassView 2->56 58 Yara detected WebBrowserPassView password recovery tool 2->58 10 iexplore.exe 6 70 2->10         started        process3 process4 12 unarchiver.exe 5 10->12         started        14 iexplore.exe 27 10->14         started        dnsIp5 17 cmd.exe 1 12->17         started        19 7za.exe 2 12->19         started        52 archive.org 207.241.224.2, 443, 49724, 49725 INTERNET-ARCHIVEUS United States 14->52 54 ia801500.us.archive.org 207.241.228.150, 443, 49726, 49727 INTERNET-ARCHIVEUS United States 14->54 process6 file7 22 RJCGQP.exe 3 17->22         started        26 conhost.exe 17->26         started        44 C:\Users\user\AppData\Local\...\RJCGQP.exe, PE32 19->44 dropped 28 conhost.exe 19->28         started        process8 file9 46 C:\Users\user\AppData\Local\Temp\B.exe, PE32 22->46 dropped 48 C:\Users\user\AppData\Local\Temp\A.exe, PE32 22->48 dropped 72 Antivirus detection for dropped file 22->72 74 Multi AV Scanner detection for dropped file 22->74 30 cmd.exe 1 22->30         started        32 cmd.exe 1 22->32         started        signatures10 process11 process12 34 B.exe 1 30->34         started        37 conhost.exe 30->37         started        39 A.exe 13 32->39         started        42 conhost.exe 32->42         started        dnsIp13 60 Multi AV Scanner detection for dropped file 34->60 62 Tries to steal Mail credentials (via file registry) 34->62 64 Tries to steal Instant Messenger accounts or passwords 34->64 66 Tries to steal Mail credentials (via file access) 34->66 50 192.168.2.1 unknown unknown 39->50 68 Machine Learning detection for dropped file 39->68 70 Tries to harvest and steal browser information (history, passwords, etc) 39->70 signatures14

              Screenshots

              Thumbnails

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.

              windows-stand

              Antivirus, Machine Learning and Genetic Malware Detection

              Initial Sample

              SourceDetectionScannerLabelLink
              https://archive.org/download/MCOPY/MCOPY.tar0%VirustotalBrowse
              https://archive.org/download/MCOPY/MCOPY.tar0%Avira URL Cloudsafe

              Dropped Files

              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exe100%AviraDR/AutoIt.Gen8
              C:\Users\user\AppData\Local\Temp\A.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Local\Temp\B.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Local\Temp\A.exe32%MetadefenderBrowse
              C:\Users\user\AppData\Local\Temp\A.exe79%ReversingLabsWin32.Infostealer.WebBrowserPassView
              C:\Users\user\AppData\Local\Temp\B.exe29%MetadefenderBrowse
              C:\Users\user\AppData\Local\Temp\B.exe72%ReversingLabsWin32.Hacktool.PasswordRevealer
              C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exe48%ReversingLabsWin32.Trojan.Nymeria

              Unpacked PE Files

              SourceDetectionScannerLabelLinkDownload
              15.2.A.exe.400000.0.unpack100%AviraHEUR/AGEN.1137731Download File
              12.0.RJCGQP.exe.1330000.0.unpack100%AviraDR/AutoIt.Gen8Download File
              12.2.RJCGQP.exe.1330000.0.unpack100%AviraDR/AutoIt.Gen8Download File
              12.3.RJCGQP.exe.463ff90.1.unpack100%AviraTR/Patched.Ren.GenDownload File

              Domains

              No Antivirus matches

              URLs

              SourceDetectionScannerLabelLink
              https://helpx.adobe.c0%Avira URL Cloudsafe
              https://cookforme.ch/routes/networks/0%Avira URL Cloudsafe
              01%VirustotalBrowse

              Domains and IPs

              Contacted Domains

              NameIPActiveMaliciousAntivirus DetectionReputation
              archive.org
              207.241.224.2
              truefalse
                high
                ia801500.us.archive.org
                207.241.228.150
                truefalse
                  high

                  Contacted URLs

                  NameMaliciousAntivirus DetectionReputation
                  0truelow

                  URLs from Memory and Binaries

                  NameSourceMaliciousAntivirus DetectionReputation
                  https://helpx.adobe.cA.exe, 0000000F.00000003.287476980.00000000022D1000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://cookforme.ch/routes/networks/RJCGQP.exe, 0000000C.00000002.328333475.0000000001185000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://login.yahoo.com/config/loginA.exefalse
                    high
                    http://www.nirsoft.netA.exe, 0000000F.00000002.288412108.0000000000193000.00000004.00000001.sdmpfalse
                      high
                      http://www.nirsoft.net/A.exe, B.exe, B.exe, 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmpfalse
                        high

                        Contacted IPs

                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs

                        Public

                        IPDomainCountryFlagASNASN NameMalicious
                        207.241.224.2
                        archive.orgUnited States
                        7941INTERNET-ARCHIVEUSfalse
                        207.241.228.150
                        ia801500.us.archive.orgUnited States
                        7941INTERNET-ARCHIVEUSfalse

                        Private

                        IP
                        192.168.2.1

                        General Information

                        Joe Sandbox Version:32.0.0 Black Diamond
                        Analysis ID:447280
                        Start date:12.07.2021
                        Start time:15:19:43
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 10m 10s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:browseurl.jbs
                        Sample URL:https://archive.org/download/MCOPY/MCOPY.tar
                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                        Number of analysed new started processes analysed:34
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal88.phis.troj.spyw.win@23/15@2/3
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 80%
                        • Number of executed functions: 153
                        • Number of non-executed functions: 213
                        Cookbook Comments:
                        • Adjust boot time
                        • Enable AMSI
                        Warnings:
                        Show All
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, ielowutil.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                        • Excluded IPs from analysis (whitelisted): 13.88.21.125, 104.43.193.48, 2.18.105.186, 95.100.54.203, 20.50.102.62, 152.199.19.161, 205.185.216.10, 205.185.216.42, 20.54.7.98, 51.103.5.159, 40.112.88.60, 20.54.104.15, 23.10.249.43, 23.10.249.26, 20.82.210.154
                        • Excluded domains from analysis (whitelisted): iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, e11290.dspg.akamaiedge.net, iecvlist.microsoft.com, wns.notify.trafficmanager.net, go.microsoft.com, audownload.windowsupdate.nsatc.net, au.download.windowsupdate.com.hwcdn.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, client.wns.windows.com, fs.microsoft.com, ie9comview.vo.msecnd.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, consumerrp-displaycatalog-aks2aks-europe.md.mp.microsoft.com.akadns.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, skypedataprdcolcus15.cloudapp.net, ris.api.iris.microsoft.com, blobcollector.events.data.trafficmanager.net, go.microsoft.com.edgekey.net, skypedataprdcolwus15.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, cs9.wpc.v0cdn.net, neu-consumerrp-displaycatalog-aks2aks-europe.md.mp.microsoft.com.akadns.net
                        • Not all processes where analyzed, report is missing behavior information

                        Simulations

                        Behavior and APIs

                        No simulations

                        Joe Sandbox View / Context

                        IPs

                        No context

                        Domains

                        No context

                        ASN

                        No context

                        JA3 Fingerprints

                        No context

                        Dropped Files

                        No context

                        Created / dropped Files

                        C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\unarchiver.exe.log
                        Process:C:\Windows\SysWOW64\unarchiver.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):388
                        Entropy (8bit):5.2529463157768355
                        Encrypted:false
                        SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk7v:MLF20NaL329hJ5g522r0
                        MD5:FF3B761A021930205BEC9D7664AE9258
                        SHA1:1039D595C6333358D5F7EE5619FE6794E6F5FDB1
                        SHA-256:A3517BC4B1E6470905F9A38466318B302186496E8706F1976F1ED76F3E87AF0F
                        SHA-512:1E77D09CF965575EF9800B1EE8947A02D98F88DBFA267300330860757A0C7350AF857A2CB7001C49AFF1F5BD1E0AE6E90F643B27054522CADC730DD14BC3DE11
                        Malicious:false
                        Reputation:low
                        Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{61F999F3-E35F-11EB-90E4-ECF4BB862DED}.dat
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:Microsoft Word Document
                        Category:dropped
                        Size (bytes):32344
                        Entropy (8bit):1.8001851111035176
                        Encrypted:false
                        SSDEEP:96:rrZYZM2BWBstBxhfBMdskMBGk0BkauDXvV850G2:rrZYZM2BWOtBf+VMECdW2
                        MD5:CC43B5C80A314DD3CBC4683923164859
                        SHA1:24D20AB9FB645B3A03442495692C9278445E8556
                        SHA-256:D13A6EA653547714A72D7CD11FECACE9E59BA620ADD737A7E5621137777543A1
                        SHA-512:6471C575EBA2E0EABA999AFDE225E07943D9DE74FB1A9332378CCBCDF1955C16ADAD85EA170FD8B4501A57F4FBE367F0B9C94E8ACB873A6DF62BC503C807CDFB
                        Malicious:false
                        Reputation:low
                        Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{61F999F5-E35F-11EB-90E4-ECF4BB862DED}.dat
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:Microsoft Word Document
                        Category:dropped
                        Size (bytes):19032
                        Entropy (8bit):1.597397819681854
                        Encrypted:false
                        SSDEEP:48:IwSGcprDGwpaTG4pQXGrapbS5hGQpBeGHHpcwiTGUpQRkGcpm:rmZdQl6rBS5bjt2wS6ug
                        MD5:ABEB230E216B51F51A1B92E10881FA3E
                        SHA1:E0E882F404209031875ECC7BDCC9D5AA8F08A927
                        SHA-256:B7096652605B7B7595A9BDE9D3FC0BDC01791A878C30213F1B1F9CB09F2AC426
                        SHA-512:88C9F1A4F9E88344D720032741A2CA0AF7372F4C0A9D6210087F1CA0C91A20F3453D7F3AF0DF62C23CE3D531EE8DD3FB435A196F489B98D5AA8FA0296BE8E7E5
                        Malicious:false
                        Reputation:low
                        Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\MCOPY.tar.nla9uw7.partial
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:POSIX tar archive
                        Category:dropped
                        Size (bytes):1574912
                        Entropy (8bit):7.4319546272021375
                        Encrypted:false
                        SSDEEP:24576:T4lavt0LkLL9IMixoEgeaNNfoXlgiYguPWIkygIJUEyIuModZ9seq9MmCS:mkwkn9IMHeaNKWVW4gIJoIuftPaPCS
                        MD5:CB0EBABD8FECB4747629D5EEFBB932C7
                        SHA1:FF2455D5C4C3223852D1037A0C0E397A93A0D734
                        SHA-256:9073F4498C23D0277C8B251F68269490502236821CF43CAD421820E4768294A5
                        SHA-512:DD91C087B480A45B2DF4706522556F5A301534F50B8E80E2274BE93546497687C505A5382EC01DB1E5EBEF536E3A071AD66CFEC5354B8EA0AC0CDA685705D042
                        Malicious:false
                        Reputation:low
                        Preview: RJCGQP.exe..........................................................................................0100777.0000000.0000000.00006001000.14072607645.007515. 0....................................................................................................ustar.00.......................................................................................................................................................................................................................................................MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S.............g.........$.............%....H......X.2........q)..Z..q).....q).......\....q).....Rich...........................PE..L......`.........."..........>.......k............@..........................`......q.....@...@.......@.....................lk..|....@...l...................... l..................................p'..@...........
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\MCOPY.tar.nla9uw7.partial:Zone.Identifier
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):26
                        Entropy (8bit):3.95006375643621
                        Encrypted:false
                        SSDEEP:3:gAWY3n:qY3n
                        MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B
                        SHA1:D59FC84CDD5217C6CF74785703655F78DA6B582B
                        SHA-256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913
                        SHA-512:AA1D2B1EA3C9DE3CCADB319D4E3E3276A2F27DD1A5244FE72DE2B6F94083DDDC762480482C5C2E53F803CD9E3973DDEFC68966F974E124307B5043E654443B98
                        Malicious:false
                        Reputation:low
                        Preview: [ZoneTransfer]..ZoneId=3..
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\MCOPY.tar:Zone.Identifier
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:very short file (no magic)
                        Category:modified
                        Size (bytes):1
                        Entropy (8bit):0.0
                        Encrypted:false
                        SSDEEP:3:W:W
                        MD5:ECCBC87E4B5CE2FE28308FD9F2A7BAF3
                        SHA1:77DE68DAECD823BABBB58EDB1C8E14D7106E83BB
                        SHA-256:4E07408562BEDB8B60CE05C1DECFE3AD16B72230967DE01F640B7E4729B49FCE
                        SHA-512:3BAFBF08882A2D10133093A1B8433F50563B93C14ACD05B79028EB1D12799027241450980651994501423A66C276AE26C43B739BC65C4E16B10C3AF6C202AEBB
                        Malicious:false
                        Reputation:low
                        Preview: 3
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\MCOPY[1].tar
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:POSIX tar archive
                        Category:dropped
                        Size (bytes):1574912
                        Entropy (8bit):7.4319546272021375
                        Encrypted:false
                        SSDEEP:24576:T4lavt0LkLL9IMixoEgeaNNfoXlgiYguPWIkygIJUEyIuModZ9seq9MmCS:mkwkn9IMHeaNKWVW4gIJoIuftPaPCS
                        MD5:CB0EBABD8FECB4747629D5EEFBB932C7
                        SHA1:FF2455D5C4C3223852D1037A0C0E397A93A0D734
                        SHA-256:9073F4498C23D0277C8B251F68269490502236821CF43CAD421820E4768294A5
                        SHA-512:DD91C087B480A45B2DF4706522556F5A301534F50B8E80E2274BE93546497687C505A5382EC01DB1E5EBEF536E3A071AD66CFEC5354B8EA0AC0CDA685705D042
                        Malicious:false
                        Reputation:low
                        Preview: RJCGQP.exe..........................................................................................0100777.0000000.0000000.00006001000.14072607645.007515. 0....................................................................................................ustar.00.......................................................................................................................................................................................................................................................MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S.............g.........$.............%....H......X.2........q)..Z..q).....q).......\....q).....Rich...........................PE..L......`.........."..........>.......k............@..........................`......q.....@...@.......@.....................lk..|....@...l...................... l..................................p'..@...........
                        C:\Users\user\AppData\Local\Temp\A.exe
                        Process:C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                        Category:dropped
                        Size (bytes):227840
                        Entropy (8bit):7.872725621072058
                        Encrypted:false
                        SSDEEP:6144:O1vaKFbcprS5qlrCkxLjgmOA05HTr7N1DPz:SaKFbcVS5FUOAe7r
                        MD5:8104093918B6F2D2004535B24B1533BA
                        SHA1:F9CF4AE46A44AB7A39F35614167B2BE9F1D66460
                        SHA-256:337A646E6F1A641D9471B840EE21BFF858E6BA24538A4F815191BE85E5003E70
                        SHA-512:D43DC6E765A528755D1004B591D580C8D3E5A49800980DAB1073848F26C67C0350FE560762B46A3602E799EA8EE861BCC4F829020D5479E48C8ED6871FD139A1
                        Malicious:true
                        Antivirus:
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        • Antivirus: Metadefender, Detection: 32%, Browse
                        • Antivirus: ReversingLabs, Detection: 79%
                        Reputation:low
                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........L..-...-...-..4"...-..4"...-.......-..-....-...-...,.......-.......-.......-.......-..Rich.-..........PE..L......^.................P...0......@.............@.......................... ...........................................................!..........................................................................................................UPX0....................................UPX1.....P.......P..................@....rsrc....0.......&...T..............@......................................................................................................................................................................................................................................................................................................................................................................................................3.07.UPX!....
                        C:\Users\user\AppData\Local\Temp\A.txt
                        Process:C:\Users\user\AppData\Local\Temp\A.exe
                        File Type:Little-endian UTF-16 Unicode text, with no line terminators
                        Category:dropped
                        Size (bytes):2
                        Entropy (8bit):1.0
                        Encrypted:false
                        SSDEEP:3:Qn:Qn
                        MD5:F3B25701FE362EC84616A93A45CE9998
                        SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                        SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                        SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                        Malicious:false
                        Reputation:low
                        Preview: ..
                        C:\Users\user\AppData\Local\Temp\B.exe
                        Process:C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                        Category:dropped
                        Size (bytes):195584
                        Entropy (8bit):7.874455805483223
                        Encrypted:false
                        SSDEEP:3072:FZ8A9WsPZ/aP7OvH4l0917a9LKzWVKOguV39I1wsYNY0Zytg8r+M1/H2h:FZ8A9WsPZCD2H4g00OKqV39I1wsMY0ZI
                        MD5:62B2864C32CB33F57A65F47269D91BE4
                        SHA1:D072FF4E71B3F53E3D198067A61BCDD835CA0D92
                        SHA-256:40257944035022D81474E714C256585977F8A89D8F960FA040A64567DE67194A
                        SHA-512:4A49E253F79F956C99F1A9A475BE40F0F419427304D94BDA821435F0DD172C09B477EAAF261F4466D7D8C54195217B675F4F78EC3A42F775336EC54CAA98BCC1
                        Malicious:true
                        Antivirus:
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        • Antivirus: Metadefender, Detection: 29%, Browse
                        • Antivirus: ReversingLabs, Detection: 72%
                        Reputation:low
                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......G=...\..\..\..S...\......\.....\..\.A].....\.$...*\.$....\.$....\.Rich.\.........PE..L....;.]..................... .......r............@............................................................................p...................................................................................................................UPX0....................................UPX1................................@....rsrc.... ..........................@..............................................................................................................................................................................................................................................................................................................................................................................................................3.07.UPX!....
                        C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):89
                        Entropy (8bit):4.33592749825611
                        Encrypted:false
                        SSDEEP:3:oVXU7UB8h98JOGXnE7UB8Mj+n:o9U7Ui3qE7UiD
                        MD5:1552C63AA2F228A9CF3685379657736C
                        SHA1:D3DCA349E7CCEFA2BDBE76FDFF3C245DBBE16D33
                        SHA-256:1547C4FAECF793C0F93BB0EC00BB2C193D186BF9A1EC7EB2D46D9B7BF44F5FA5
                        SHA-512:34CD17F314D90B4C2AD9D1FF27D8CFA5A40AF93FF46B672C3FAA7C64F8CC663D9CC8C0B22CA1BC75B4A9CC761BCEDFD87E0F80667C22D312A28EE396B1D206A2
                        Malicious:false
                        Reputation:low
                        Preview: [2021/07/12 15:20:39.251] Latest deploy version: ..[2021/07/12 15:20:39.251] 11.211.2 ..
                        C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exe
                        Process:C:\Windows\SysWOW64\7za.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):1573376
                        Entropy (8bit):7.4358659988087075
                        Encrypted:false
                        SSDEEP:24576:G4lavt0LkLL9IMixoEgeaNNfoXlgiYguPWIkygIJUEyIuModZ9seq9MmCS:Rkwkn9IMHeaNKWVW4gIJoIuftPaPCS
                        MD5:AD4B4A3179D923A637CEB9AC2E1CB00A
                        SHA1:077236612B707790616928108DE141EE3F360B47
                        SHA-256:F9AE72D6C093948A21E116AF6E304B8CBE41D043AEFF6C16B068EA375C0D8C2C
                        SHA-512:A2E99053B76E20DC6D1CFEA95771A645B861BCA82B6098F6569A98F7E6A095B91FC29F48D8DB8EA659AE6A9312C73013B9DB6DA215E826DC79159865FF98C476
                        Malicious:true
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 48%
                        Reputation:low
                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S.............g.........$.............%....H......X.2........q)..Z..q).....q).......\....q).....Rich...........................PE..L......`.........."..........>.......k............@..........................`......q.....@...@.......@.....................lk..|....@...l...................... l..................................p'..@...............X............................text...t........................... ..`.rdata..j...........................@..@.data...4........b..................@....rsrc....l...@...n..................@..@.reloc..b............\..............@..B........................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Temp\mdmjdc2j.33g\unarchiver.log
                        Process:C:\Windows\SysWOW64\unarchiver.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):1696
                        Entropy (8bit):5.203135429150786
                        Encrypted:false
                        SSDEEP:48:+EDwJGJGbJGJGpLGEgEGJGpCD9GbnGRD9GxG7TlG6GKGJGEGJGgFGX23vJ:+cV7OCLJ9R
                        MD5:C75092579A84BBBE49949D51C2BFB282
                        SHA1:BB72F6B0F65FC1473FCDD56F12D84CA5C4A7E523
                        SHA-256:39EFBFE6AE9F5122C490EEE66C41CD8D59B3ED3B91B346AAF2AF6567F6279419
                        SHA-512:58919F638EFA4F4AF6E10A33075EF121CF25E370446C05B04F77C8CEDA963020694333ED408CADCE89528E1715D7DDEF847EE64FD6FC09259B2DCCAF1375861F
                        Malicious:false
                        Reputation:low
                        Preview: 07/12/2021 3:21 PM: Unpack: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\MCOPY.tar..07/12/2021 3:21 PM: Tmp dir: C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x..07/12/2021 3:21 PM: Received from standard out: ..07/12/2021 3:21 PM: Received from standard out: 7-Zip 18.05 (x86) : Copyright (c) 1999-2018 Igor Pavlov : 2018-04-30..07/12/2021 3:21 PM: Received from standard out: ..07/12/2021 3:21 PM: Received from standard out: Scanning the drive for archives:..07/12/2021 3:21 PM: Received from standard out: 1 file, 1574912 bytes (1538 KiB)..07/12/2021 3:21 PM: Received from standard out: ..07/12/2021 3:21 PM: Received from standard out: Extracting archive: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\MCOPY.tar..07/12/2021 3:21 PM: Received from standard out: --..07/12/2021 3:21 PM: Received from standard out: Path = C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\MCOPY.tar..07/12/2021 3:21 PM: Received from standard out:
                        C:\Users\user\AppData\Local\Temp\~DF10E708BDA7DE05C8.TMP
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):12981
                        Entropy (8bit):0.4455445324961655
                        Encrypted:false
                        SSDEEP:24:c9lLh9lLh9lIn9lIn9lowF9lo49lWh5A/6:kBqoID1h5Ai
                        MD5:1DA4A699830C663C89FDBEB8CB0B1F41
                        SHA1:EDFEDE7E8075297688AF9E960A5A12E0345D2804
                        SHA-256:C75FDEDECD45E52A0CD0C3AF0DC7559643511A575B0CE24916D288B0ADEB9138
                        SHA-512:83609FA2BD4BC9B698E7DEAF6C0A5108E896444C532AC286871397A782DE139A198A053C41EB38082FE1FEBD5B0776D4041A690E38D97EA3D56FA3D66325D8CB
                        Malicious:false
                        Reputation:low
                        Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Temp\~DFD1669ABBB8624462.TMP
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):29989
                        Entropy (8bit):0.32932911639885465
                        Encrypted:false
                        SSDEEP:24:c9lLh9lLh9lIn9lIn9lRg9lRA9lTS9lTy9lSSd9lSSd9lwNF9lwgi9l2R/9l2J9p:kBqoxKAuvScS+w2R+gRy
                        MD5:F7561CA4A7DB7B480ACF2BFC1C61B9D9
                        SHA1:4F49A7D12C6A8FF1A668FBED136E5F3569AA6373
                        SHA-256:D543E7B733E806D0EE84F64B15168A30DF46132E20B2BD149252A1A1DF84B72A
                        SHA-512:B38E08C5FCF52C4EC379D4AA169818E14DB10F771866FBDE4213EE196A933EF24A30E7561F8A9AC60151F38593D65846E65832CC7E8FF7F1F62C84B45D6BB6EE
                        Malicious:false
                        Reputation:low
                        Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                        Static File Info

                        No static file info

                        Network Behavior

                        Network Port Distribution

                        TCP Packets

                        TimestampSource PortDest PortSource IPDest IP
                        Jul 12, 2021 15:20:39.772207022 CEST49725443192.168.2.3207.241.224.2
                        Jul 12, 2021 15:20:39.772475958 CEST49724443192.168.2.3207.241.224.2
                        Jul 12, 2021 15:20:39.932341099 CEST44349725207.241.224.2192.168.2.3
                        Jul 12, 2021 15:20:39.932411909 CEST44349724207.241.224.2192.168.2.3
                        Jul 12, 2021 15:20:39.932488918 CEST49725443192.168.2.3207.241.224.2
                        Jul 12, 2021 15:20:39.932564020 CEST49724443192.168.2.3207.241.224.2
                        Jul 12, 2021 15:20:39.941368103 CEST49724443192.168.2.3207.241.224.2
                        Jul 12, 2021 15:20:39.941838026 CEST49725443192.168.2.3207.241.224.2
                        Jul 12, 2021 15:20:40.101120949 CEST44349724207.241.224.2192.168.2.3
                        Jul 12, 2021 15:20:40.101802111 CEST44349725207.241.224.2192.168.2.3
                        Jul 12, 2021 15:20:40.102020025 CEST44349724207.241.224.2192.168.2.3
                        Jul 12, 2021 15:20:40.102051020 CEST44349724207.241.224.2192.168.2.3
                        Jul 12, 2021 15:20:40.102140903 CEST49724443192.168.2.3207.241.224.2
                        Jul 12, 2021 15:20:40.102190971 CEST49724443192.168.2.3207.241.224.2
                        Jul 12, 2021 15:20:40.102319956 CEST44349724207.241.224.2192.168.2.3
                        Jul 12, 2021 15:20:40.102344990 CEST44349724207.241.224.2192.168.2.3
                        Jul 12, 2021 15:20:40.102369070 CEST44349725207.241.224.2192.168.2.3
                        Jul 12, 2021 15:20:40.102437973 CEST49724443192.168.2.3207.241.224.2
                        Jul 12, 2021 15:20:40.102463007 CEST49724443192.168.2.3207.241.224.2
                        Jul 12, 2021 15:20:40.102535009 CEST44349725207.241.224.2192.168.2.3
                        Jul 12, 2021 15:20:40.102559090 CEST44349725207.241.224.2192.168.2.3
                        Jul 12, 2021 15:20:40.102572918 CEST44349725207.241.224.2192.168.2.3
                        Jul 12, 2021 15:20:40.102606058 CEST49725443192.168.2.3207.241.224.2
                        Jul 12, 2021 15:20:40.102627993 CEST49725443192.168.2.3207.241.224.2
                        Jul 12, 2021 15:20:40.102786064 CEST49725443192.168.2.3207.241.224.2
                        Jul 12, 2021 15:20:40.103854895 CEST44349724207.241.224.2192.168.2.3
                        Jul 12, 2021 15:20:40.103888988 CEST44349724207.241.224.2192.168.2.3
                        Jul 12, 2021 15:20:40.104006052 CEST49724443192.168.2.3207.241.224.2
                        Jul 12, 2021 15:20:40.104886055 CEST44349725207.241.224.2192.168.2.3
                        Jul 12, 2021 15:20:40.104908943 CEST44349725207.241.224.2192.168.2.3
                        Jul 12, 2021 15:20:40.105012894 CEST49725443192.168.2.3207.241.224.2
                        Jul 12, 2021 15:20:40.144195080 CEST49725443192.168.2.3207.241.224.2
                        Jul 12, 2021 15:20:40.145546913 CEST49724443192.168.2.3207.241.224.2
                        Jul 12, 2021 15:20:40.149873018 CEST49724443192.168.2.3207.241.224.2
                        Jul 12, 2021 15:20:40.150078058 CEST49724443192.168.2.3207.241.224.2
                        Jul 12, 2021 15:20:40.150377035 CEST49725443192.168.2.3207.241.224.2
                        Jul 12, 2021 15:20:40.305769920 CEST44349725207.241.224.2192.168.2.3
                        Jul 12, 2021 15:20:40.305795908 CEST44349725207.241.224.2192.168.2.3
                        Jul 12, 2021 15:20:40.305886030 CEST49725443192.168.2.3207.241.224.2
                        Jul 12, 2021 15:20:40.307378054 CEST49725443192.168.2.3207.241.224.2
                        Jul 12, 2021 15:20:40.307693958 CEST44349724207.241.224.2192.168.2.3
                        Jul 12, 2021 15:20:40.307710886 CEST44349724207.241.224.2192.168.2.3
                        Jul 12, 2021 15:20:40.307780981 CEST49724443192.168.2.3207.241.224.2
                        Jul 12, 2021 15:20:40.307810068 CEST49724443192.168.2.3207.241.224.2
                        Jul 12, 2021 15:20:40.308273077 CEST49724443192.168.2.3207.241.224.2
                        Jul 12, 2021 15:20:40.311198950 CEST44349725207.241.224.2192.168.2.3
                        Jul 12, 2021 15:20:40.311223984 CEST44349724207.241.224.2192.168.2.3
                        Jul 12, 2021 15:20:40.311290026 CEST49725443192.168.2.3207.241.224.2
                        Jul 12, 2021 15:20:40.311333895 CEST49724443192.168.2.3207.241.224.2
                        Jul 12, 2021 15:20:40.334723949 CEST44349724207.241.224.2192.168.2.3
                        Jul 12, 2021 15:20:40.334841013 CEST49724443192.168.2.3207.241.224.2
                        Jul 12, 2021 15:20:40.411098003 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:40.411123991 CEST49727443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:40.509921074 CEST44349724207.241.224.2192.168.2.3
                        Jul 12, 2021 15:20:40.509951115 CEST44349725207.241.224.2192.168.2.3
                        Jul 12, 2021 15:20:40.570688009 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:40.570852995 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:40.570918083 CEST44349727207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:40.571011066 CEST49727443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:40.571331978 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:40.571893930 CEST49727443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:40.729294062 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:40.729592085 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:40.729623079 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:40.729701996 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:40.729722977 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:40.729789972 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:40.729827881 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:40.731554031 CEST44349727207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:40.731769085 CEST44349727207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:40.731854916 CEST49727443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:40.731856108 CEST44349727207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:40.731882095 CEST44349727207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:40.731895924 CEST44349727207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:40.731915951 CEST49727443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:40.731961012 CEST49727443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:40.732563019 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:40.732579947 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:40.732654095 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:40.732682943 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:40.734802008 CEST44349727207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:40.734826088 CEST44349727207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:40.734920979 CEST49727443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:40.734937906 CEST49727443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:40.740775108 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:40.741149902 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:40.741818905 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:40.744579077 CEST49727443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:40.744946003 CEST49727443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:40.899055958 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:40.899091959 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:40.899156094 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:40.899205923 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:40.899264097 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:40.899687052 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:40.899725914 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:40.900120020 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:40.900593996 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:40.900629997 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:40.900655985 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:40.900688887 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:40.900721073 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:40.900722027 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:40.900758982 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:40.900764942 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:40.900769949 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:40.900780916 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:40.900840044 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:40.900863886 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:40.900937080 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:40.900947094 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:40.900952101 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:40.900969982 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:40.901056051 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:40.901093006 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:40.901129007 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:40.901140928 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:40.904706955 CEST44349727207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:40.907968044 CEST44349727207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:40.907998085 CEST44349727207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:40.908014059 CEST44349727207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:40.908030987 CEST44349727207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:40.908071041 CEST49727443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:40.908107996 CEST49727443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:40.908948898 CEST49727443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.057595968 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.057626963 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.057718039 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.057756901 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.057857037 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.057921886 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.058128119 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.058188915 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.058401108 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.058902025 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.058928013 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.058950901 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.058963060 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.058986902 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.059020996 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.059082985 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.059086084 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.059103012 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.059144020 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.059158087 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.059181929 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.059199095 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.059202909 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.059227943 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.059247017 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.059251070 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.059251070 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.059269905 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.059277058 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.059288979 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.059302092 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.059317112 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.059325933 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.059350967 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.059350967 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.059370995 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.059376955 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.059387922 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.059401035 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.059421062 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.059425116 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.059433937 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.059448004 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.059473991 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.059473991 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.059489012 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.059498072 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.059520960 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.059540987 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.068535089 CEST44349727207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.215646982 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.215686083 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.215708971 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.215735912 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.215759039 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.215760946 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.215786934 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.215792894 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.215796947 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.215812922 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.215841055 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.215920925 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.216012955 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.216067076 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.216080904 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.216125011 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.217485905 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.217539072 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.217561960 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.217578888 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.217593908 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.217612982 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.217638969 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.217685938 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.217710018 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.217714071 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.217716932 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.217792988 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.217820883 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.217838049 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.217853069 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.217865944 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.217879057 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.217894077 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.217916965 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.217925072 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.217942953 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.217946053 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.217977047 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.217979908 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.217983007 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.217983007 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.218008041 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.218039989 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.218049049 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.218050003 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.218107939 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.218108892 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.218167067 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.218172073 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.218205929 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.218262911 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.218389034 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.218457937 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.218487978 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.218512058 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.218533993 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.218539000 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.218549013 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.218552113 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.218554974 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.218559027 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.218564034 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.218581915 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.218596935 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.218605042 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.218611002 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.218628883 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.218635082 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.218657017 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.218677998 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.218728065 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.218750000 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.218771935 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.218805075 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.218807936 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.218830109 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.218832016 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.218863010 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.218899965 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.218878031 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.218920946 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.218943119 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.218943119 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.218997955 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.219022036 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.219059944 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.219084024 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.219223976 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.219302893 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.374670982 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.374690056 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.374707937 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.374726057 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.374742985 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.374777079 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.374782085 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.374800920 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.374819994 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.374824047 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.374927998 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.374931097 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.374958038 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.374974012 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.374989986 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.375036001 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.375041962 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.375045061 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.375047922 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.375164032 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.375273943 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.375288010 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.375293970 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.375305891 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.375324965 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.375329971 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.375376940 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.376127958 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.376154900 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.376208067 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.376233101 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.376280069 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.376298904 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.376313925 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.376328945 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.376346111 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.376363993 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.376363993 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.376373053 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.376415014 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.376429081 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.377146959 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.377207041 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.377278090 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.377301931 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.377332926 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.377346039 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.377487898 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.377540112 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.377573967 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.377640009 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.377671957 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.377693892 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.377711058 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.377722979 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.377743006 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.377768993 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.378103018 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.378128052 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.378146887 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.378161907 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.378175974 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.378211021 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.378221035 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.378268003 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.378390074 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.378427982 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.378448009 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.378469944 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.378489017 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.378511906 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.378532887 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.378552914 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.378572941 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.378592968 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.378612995 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.378634930 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.378657103 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.378679991 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.378689051 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.378705025 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.378706932 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.378710032 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.378714085 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.378715992 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.378719091 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.378721952 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.378722906 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.378726006 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.378729105 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.378761053 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.378778934 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.378941059 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.378958941 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.378974915 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.378990889 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.379007101 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.379024029 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.379040003 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.379059076 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.379173994 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.379214048 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.379234076 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.379237890 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.379240990 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.379242897 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.379245996 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.379249096 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.379251957 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.379256010 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.379276037 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.379312038 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.379331112 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.379363060 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.379391909 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.379410028 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.379456997 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.379471064 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.379475117 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.379477978 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.379482031 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.379484892 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.379544020 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.379688978 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.379765987 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.379829884 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.379841089 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.379874945 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.379906893 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.379913092 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.381329060 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.381347895 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.381357908 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.381449938 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.381457090 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.381516933 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.381521940 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.381571054 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.381620884 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.381644011 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.381658077 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.381674051 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.381689072 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.381705046 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.381715059 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.381719112 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.381728888 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.381736994 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.381738901 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.381758928 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.381759882 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.381767035 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.381783009 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.381797075 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.381808996 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.381829023 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.381844044 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.381860018 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.381861925 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.381877899 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.381880045 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.381897926 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.381901026 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.381922007 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.381922960 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.381951094 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.381966114 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.533130884 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.533164978 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.533176899 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.533196926 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.533215046 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.533231020 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.533253908 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.533286095 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.533303022 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.533308029 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.533328056 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.533355951 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.533377886 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.533396959 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.533413887 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.533431053 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.533447981 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.533461094 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.533474922 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.533487082 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.533514023 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.533579111 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.533601999 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.533627987 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.533653975 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.533662081 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.533668041 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.533678055 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.533691883 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.533700943 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.533714056 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.533725023 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.533740997 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.533749104 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.533761024 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.533772945 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.533781052 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.533797026 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.533802032 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.533823967 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.533824921 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.533845901 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.533849955 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.533860922 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.533869028 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.533890963 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.533890963 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.533912897 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.533921003 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.533936024 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.533943892 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.533958912 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.533967972 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.533982992 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.533987999 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.534010887 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.534025908 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.534035921 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.534060955 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.534080982 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.534101963 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.534132004 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.534179926 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.534317970 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.534354925 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.534410954 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.534430981 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.534605980 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.534648895 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.534673929 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.534713984 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.534722090 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.534746885 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.534750938 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.534750938 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.534775019 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.534781933 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.534806967 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.534809113 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.534828901 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.534833908 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.534883976 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.534909964 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.535341978 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.535376072 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.535399914 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.535423040 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.535445929 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.535469055 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.535495043 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.535520077 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.535520077 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.535542965 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.535571098 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.535576105 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.535578966 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.535582066 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.535584927 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.535588026 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.535590887 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.535593987 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.535725117 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.535752058 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.535775900 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.535799026 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.535823107 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.535844088 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.535866976 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.535891056 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.535918951 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.535944939 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.535968065 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.535990953 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.535993099 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.536005020 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.536009073 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.536010981 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.536014080 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.536015987 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.536019087 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.536021948 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.536025047 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.536068916 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.537244081 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.537277937 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.537321091 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.537341118 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.537364006 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.537420988 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.537421942 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.537476063 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.537513018 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.537575006 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.537589073 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.537612915 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.537635088 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.537646055 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.537683010 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.537722111 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.537745953 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.537781000 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.537803888 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.537971973 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.538031101 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.538043976 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.538077116 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.538098097 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.538104057 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.538125992 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.538137913 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.538158894 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.538167953 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.538187027 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.538197041 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.538216114 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.538224936 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.538245916 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.538256884 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.538274050 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.538283110 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.538307905 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.538314104 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.538331985 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.538341999 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.538357973 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.538369894 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.538369894 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.538417101 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.538520098 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.538552046 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.538579941 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.538579941 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.538598061 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.538608074 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.538630962 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.538640976 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.538672924 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.538703918 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.538746119 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.538762093 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.538764954 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.538769007 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.538770914 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.538815975 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.538861036 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.538889885 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.538916111 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.538921118 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.538979053 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.539005041 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.539016962 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.539020061 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.539020061 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.539072990 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.540060997 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.540118933 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.540254116 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.540301085 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.540302992 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.540337086 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.540357113 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.540374994 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.540379047 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.540412903 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.540417910 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.540450096 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.540478945 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.540491104 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.540518999 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.540528059 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.540529966 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.540560961 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.540582895 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.540601969 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.540601969 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.540653944 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.540671110 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.540704012 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.540725946 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.540740013 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.540744066 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.540781975 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.540808916 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.540837049 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.540863037 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.540863991 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.540887117 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.540904045 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.540906906 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.540941000 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.540947914 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.540975094 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.540993929 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.541009903 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.541032076 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.541048050 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.541073084 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.541089058 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.541093111 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.541136026 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.541181087 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.541204929 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.541220903 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.541234970 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.541239023 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.541261911 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.541300058 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.541336060 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.541337967 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.541342974 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.541346073 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.541378021 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.541380882 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.541413069 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.541434050 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.541451931 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.541456938 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.541487932 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.541515112 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.541527987 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.541558981 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.541574001 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.541587114 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.541610003 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.541635036 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.541649103 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.541682959 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.541690111 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.541691065 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.541728973 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.541754007 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.541769981 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.541775942 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.541809082 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.541831017 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.541845083 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.541866064 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.541891098 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.541898012 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.541930914 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.541954041 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.541968107 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.541974068 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.542005062 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.542026997 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.542042971 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.542047977 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.542082071 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.542083025 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.542125940 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.542145967 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.542176962 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.542201042 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.542216063 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.542236090 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.542251110 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.542272091 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.542288065 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.542311907 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.542327881 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.542330980 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.542365074 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.542386055 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.542402029 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.542414904 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.542449951 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.701822996 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.702038050 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.753638983 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.753696918 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.753726006 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.753751040 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.753778934 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.753804922 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.753818989 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.753829956 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.753856897 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.753860950 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.753868103 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.753871918 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.753881931 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.753906012 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.753906012 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.753925085 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.753947020 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.753961086 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.753972054 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.753990889 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.754024029 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.754059076 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.754081011 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.754105091 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.754107952 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.754127026 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.754151106 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.754151106 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.754173994 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.754189968 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.754196882 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.754219055 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.754219055 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.754241943 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.754271030 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.754370928 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.754373074 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.754395962 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.754425049 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.754457951 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.754484892 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.754511118 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.754533052 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.754537106 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.754561901 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.754565954 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.754584074 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.754590034 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.754618883 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.754635096 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.754651070 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.754678965 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.754695892 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.754729033 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.754776001 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.754817963 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.754825115 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.754848003 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.754870892 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.754895926 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.754904032 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.754924059 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.754949093 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.754975080 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.809387922 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.809432030 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.809459925 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.809478045 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.809536934 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.809561014 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.809585094 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.809611082 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.809626102 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.809633017 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.809659004 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.809659958 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.809679985 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.809683084 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.809700966 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.809710979 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.809743881 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.809760094 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.809796095 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.809813023 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.809815884 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.809833050 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.809844971 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.809879065 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.809880972 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.809902906 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.809926033 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.809956074 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.810024977 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.810045958 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.810070038 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.810071945 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.810091019 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.810103893 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.810137033 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.810137987 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.810198069 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.810199022 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.810225964 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.810245991 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.810247898 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.810271025 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.810297966 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.810298920 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.810316086 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.810336113 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.810345888 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.810374975 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.810383081 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.810405016 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.810426950 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.810427904 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.810465097 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.810497999 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.810520887 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.810543060 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.810568094 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.810625076 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.810647964 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.810668945 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.810669899 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.810697079 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.810719967 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.810743093 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.810765028 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.810786009 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.810786963 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.810802937 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.810826063 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.810830116 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.810852051 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.810856104 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.810873032 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.810893059 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.810894012 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.810915947 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.810924053 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.810956955 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.810966015 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.810988903 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.811008930 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.811028957 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.811038017 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.811075926 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.811084986 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.811099052 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.811127901 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.811155081 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.811176062 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.811223984 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.811280966 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.811309099 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.811328888 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.811331987 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.811352968 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.811361074 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.811374903 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.811383009 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.811397076 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.811405897 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.811428070 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.811451912 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.811486006 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.811516047 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.811531067 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.811537981 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.811564922 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.811582088 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.811644077 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.811667919 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.811688900 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.811691046 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.811722040 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.811743021 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.811784029 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.811809063 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.811829090 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.811829090 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.811858892 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.811861992 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.811882973 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.811903954 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.812033892 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.812062979 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.812089920 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.812096119 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.812119007 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.812140942 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.812144995 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.812170029 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.812170982 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.812194109 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.812203884 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.812222958 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.812232018 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.812238932 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.812272072 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.812366962 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.812396049 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.812418938 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.812421083 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.812450886 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.812454939 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.812473059 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.812484980 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.812496901 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.812511921 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.812520027 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.812539101 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.812541962 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.812566042 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.812582970 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.812592030 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.812616110 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.812618017 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.812635899 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.812657118 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.812693119 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.812714100 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.812736988 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.812760115 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.812769890 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.812799931 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.812808990 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.812843084 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.812889099 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.812917948 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.812947035 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.812963963 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.812987089 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.812989950 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.813010931 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.813034058 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.813046932 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.813075066 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.813098907 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.813102961 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.813118935 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.813128948 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.813149929 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.813174963 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.813211918 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.813241959 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.813262939 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.813272953 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.813288927 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.813290119 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.813313961 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.813317060 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.813363075 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.813366890 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.813379049 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.813394070 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.813417912 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.813426971 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.813441038 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.813457966 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.813477993 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.813483000 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.813503981 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.813510895 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.813529015 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.813535929 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.813554049 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.813580990 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.860774994 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.860800028 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.860814095 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.860837936 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.860857964 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.860869884 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.860882044 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.860908031 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.860932112 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.860953093 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.860980988 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.860984087 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.860986948 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.861026049 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.861052990 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.861104965 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.861120939 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.861151934 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.861161947 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.861193895 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.861221075 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.861262083 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.861316919 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.861336946 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.861352921 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.861361027 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.861381054 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.861397982 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.861402035 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.861438990 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.861440897 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.861459970 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.861479998 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.861500025 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.861578941 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.861627102 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.861634016 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.861671925 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.861737967 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.861758947 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.861780882 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.861782074 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.861799955 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.861802101 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.861820936 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.861825943 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.861849070 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.861870050 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.861886024 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.861917973 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.861937046 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.861964941 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.862133980 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.862159967 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.862181902 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.862200022 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.862207890 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.862216949 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.862226009 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.862232924 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.862250090 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.862267017 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.862276077 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.862299919 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.862328053 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.862329960 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.862395048 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.863715887 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.863749027 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.863766909 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.863780975 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.863792896 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.863805056 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.863821983 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.863823891 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.863837957 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.863847017 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.863856077 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.863873959 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.863894939 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.863898039 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.863910913 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.863919973 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.863929033 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.863945961 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.863955021 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.863962889 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.863975048 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.863977909 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.863991022 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.863996983 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.864008904 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.864032030 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.864053011 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.864068031 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.911947012 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.911973953 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.912028074 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.912045956 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.912098885 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.912097931 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.912122011 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.912127018 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.912169933 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.912277937 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.912307978 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.912321091 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.912370920 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.912379980 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.912400961 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.912404060 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.912420988 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.912441015 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.912470102 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.912492990 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.912511110 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.912528038 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.912542105 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.912559986 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.912580967 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.912617922 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.912818909 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.912837982 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.912853956 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.912870884 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.912889957 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.912889004 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.912906885 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.912914038 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.912923098 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.912939072 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.912957907 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.913182020 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.913512945 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.913569927 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.915730953 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.915755987 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.915767908 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.915841103 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.915880919 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.915900946 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.915913105 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.915925980 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.915927887 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.915944099 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.915973902 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.916004896 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.916024923 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.916043997 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.916054964 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.916059971 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.916085958 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.916134119 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.967920065 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.967953920 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.968044996 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.968077898 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.968194962 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.968250036 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.968446970 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.968501091 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.968568087 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.968614101 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.968698978 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.968720913 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.968739033 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.968750000 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.968780994 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.968791008 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.968816042 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.968832970 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.968852997 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.968861103 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.968871117 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.968887091 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.968894005 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.968924999 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.968939066 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.968955040 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.968986034 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.969011068 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.969223976 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.969244003 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.969263077 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.969278097 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.969280958 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.969297886 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.969300985 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.969341040 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.969471931 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.969491005 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.969506979 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.969518900 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.969553947 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.969595909 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.969613075 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.969640970 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.969676971 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.969755888 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.969774008 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.969805956 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.969835043 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.969858885 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.969876051 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.969892025 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.969902039 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.969954967 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.969976902 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.969994068 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.970010996 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.970021009 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.970053911 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.970104933 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.970123053 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.970151901 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.970186949 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.970236063 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.970280886 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.970344067 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.970362902 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.970374107 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.970395088 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.970419884 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.970491886 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.970555067 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.970622063 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.970639944 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.970657110 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.970665932 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.970674038 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.970695019 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.970724106 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.970761061 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.970813036 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.971218109 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.971273899 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.971286058 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.971292019 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.971321106 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.971338987 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.971400976 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.971420050 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:41.971445084 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:41.971641064 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.130803108 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.130873919 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.130877972 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.130928040 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.130929947 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.130975008 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.130981922 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.131027937 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.131031990 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.131077051 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.131089926 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.131174088 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.131196976 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.131215096 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.131232023 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.131278038 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.131283998 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.131314993 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.131331921 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.131377935 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.131382942 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.131424904 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.131445885 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.131489038 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.131493092 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.131536007 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.131537914 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.131582975 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.131588936 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.131633997 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.131642103 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.131700039 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.131707907 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.131753922 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.131835938 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.131886005 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.131886959 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.131932020 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.131939888 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.131984949 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.131989002 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.132031918 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.132045984 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.132091999 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.132100105 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.132144928 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.132158041 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.132203102 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.132215023 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.132261038 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.132267952 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.132313013 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.132318020 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.132359982 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.132369041 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.132410049 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.132419109 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.132462978 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.132468939 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.132510900 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.132519960 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.132567883 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.132570982 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.132616043 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.132627964 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.132674932 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.132680893 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.132725954 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.134905100 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.134963036 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135242939 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.135252953 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.135301113 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135324001 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135343075 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135351896 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.135360003 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135369062 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.135376930 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135387897 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.135390997 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135409117 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135411024 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.135430098 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135442972 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.135447979 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135463953 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135468006 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.135481119 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135492086 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.135499001 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135509014 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.135515928 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135528088 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.135533094 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135550022 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135552883 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.135572910 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135584116 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.135592937 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135612965 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.135632992 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135634899 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.135654926 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135668993 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135680914 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135688066 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.135698080 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135710955 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135710955 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.135727882 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135740995 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.135744095 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135757923 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135761023 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.135773897 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135787964 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.135792017 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135811090 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135818005 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.135827065 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135835886 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.135843992 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135860920 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135868073 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.135878086 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135900021 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.135916948 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135922909 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.135936022 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135952950 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135953903 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.135967016 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135979891 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.135987997 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136001110 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136015892 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136022091 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136045933 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136050940 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136069059 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136070013 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136094093 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136094093 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136111975 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136115074 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136127949 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136143923 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136147022 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136157990 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136168957 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136183023 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136188030 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136198044 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136202097 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136214018 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136219978 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136230946 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136236906 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136250973 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136254072 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136264086 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136281013 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136285067 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136303902 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136311054 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136321068 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136331081 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136338949 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136356115 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136356115 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136368036 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136375904 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136392117 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136399984 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136410952 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136419058 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136432886 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136445999 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136451006 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136467934 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136470079 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136485100 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136497021 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136502028 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136518002 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136526108 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136534929 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136550903 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136560917 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136569977 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136580944 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136589050 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136605978 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136614084 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136621952 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136639118 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136643887 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136657000 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136671066 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136674881 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136701107 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136718988 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136728048 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136739016 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136743069 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136758089 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136770010 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136773109 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136786938 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136794090 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136807919 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136816978 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136826992 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136842966 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136852980 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136859894 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136873960 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136877060 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136893988 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136908054 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136909962 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136926889 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136936903 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136946917 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136961937 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.136965990 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136984110 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.136989117 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.137001991 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.137017965 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.137027979 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.137031078 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.137044907 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.137048006 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.137065887 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.137075901 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.137082100 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.137090921 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.137099981 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.137110949 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.137115002 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.137132883 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.137144089 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.137144089 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.137164116 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.137171030 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.137181044 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.137190104 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.137193918 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.137207031 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.137223005 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.137232065 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.137236118 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.137253046 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.137263060 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.137268066 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.137284040 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.137310028 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.290133953 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.290169001 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.290230989 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.290258884 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.290390015 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.290429115 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.290457964 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.290513039 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.290555954 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.290591955 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.290616035 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.290616989 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.290659904 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.290678024 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.290688038 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.290736914 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.290747881 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.290893078 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.290941000 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.290955067 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.291016102 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.291076899 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.291096926 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.291156054 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.291166067 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.291299105 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.291318893 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.291327000 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.291340113 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.291363955 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.291385889 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.291409969 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.291441917 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.291448116 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.291511059 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.291551113 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.291574955 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.291591883 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.291600943 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.291661024 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.291667938 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.291703939 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.291727066 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.291727066 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.291747093 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.291790962 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.291820049 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.291838884 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.291867971 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.291893005 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.291944981 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.291946888 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.292049885 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.296371937 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.296411037 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.296439886 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.296473980 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.296637058 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.296683073 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.296694994 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.296710014 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.296734095 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.296758890 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.296827078 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.296834946 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.296859026 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.296889067 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.296933889 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.296961069 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.297003984 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.297017097 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.297025919 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.297051907 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.297060966 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.297075987 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.297089100 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.297122002 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.297199011 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.297221899 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.297246933 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.297277927 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.297291040 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.297321081 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.297322035 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.297373056 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.297442913 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.297452927 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.297519922 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.297533989 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.297579050 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.297599077 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.297641039 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.297650099 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.297666073 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.297688961 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.297700882 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.297732115 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.297750950 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.297776937 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.297801018 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.297846079 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.297863960 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.297888994 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.297909975 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.297914028 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.297933102 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.297960043 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.297988892 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.298001051 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.298032999 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.298051119 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.298089027 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.298116922 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.298141956 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.298163891 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.298170090 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.298218012 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.298223019 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.298244953 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.298270941 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.298273087 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.298325062 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.298358917 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.298409939 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.298413992 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.298440933 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.298463106 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.298464060 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.298491001 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.298521996 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.298604965 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.298630953 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.298651934 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.298655033 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.298676014 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.298679113 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.298710108 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.298743963 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.298758030 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.298780918 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.298804045 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.298806906 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.298827887 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.298854113 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.298856020 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.298876047 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.298897982 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.298909903 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.298921108 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.298953056 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.298990965 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.298996925 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.299024105 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.299046993 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.299062967 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.299069881 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.299093962 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.299127102 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.299132109 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.299141884 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.299159050 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.299186945 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.299213886 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.448069096 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.448115110 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.448156118 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.448170900 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.448185921 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.448204041 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.448213100 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.448221922 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.448318005 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.448585987 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.448676109 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.448678017 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.448729038 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.448729992 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.448792934 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.448810101 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.448836088 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.448858976 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.448883057 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.448968887 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.449305058 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.449382067 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.449412107 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.449501038 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.449652910 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.449681044 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.449717999 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.449774027 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.449786901 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.449841976 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.449888945 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.449956894 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.454833984 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.454864025 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.454952955 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.455012083 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.455157995 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.455183983 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.455207109 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.455226898 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.455245018 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.455248117 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.455272913 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.455296040 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.455317974 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.455343962 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.455348969 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.455368042 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.455389977 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.455410957 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.455437899 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.455463886 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.455496073 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.455585957 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.455611944 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.455678940 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.455813885 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.455890894 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.456044912 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.456073046 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.456095934 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.456126928 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.456219912 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.456382036 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.456402063 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.456459045 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.456486940 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.456510067 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.456517935 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.456552982 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.456655979 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.456681013 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.456712008 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.456727028 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.457174063 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.457209110 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.457242012 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.457264900 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.457377911 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.457437992 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.457461119 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.457473040 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.457499027 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.457542896 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.457545996 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.457593918 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.457874060 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.457937002 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.457957029 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.457983017 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.458008051 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.458015919 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.458031893 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.458049059 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.458056927 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.458080053 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.458087921 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.458102942 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.458122969 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.458153009 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.458156109 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.458175898 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.458203077 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.458226919 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.458230019 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.458278894 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.458282948 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.458326101 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.458329916 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.458364964 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.458386898 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.458415031 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.458431959 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.458456039 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.458479881 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.458489895 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.458506107 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.458522081 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.458529949 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.458555937 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.458561897 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.458580971 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.458596945 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.458604097 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.458631992 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.458686113 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.458692074 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.458734989 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.458750010 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.458796024 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.458806038 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.458842039 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.458858013 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.458890915 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.458914995 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.458915949 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.458935022 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.458956957 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.458961010 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.458981991 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.459007025 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.459023952 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.459024906 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.459069014 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.459487915 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.459539890 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.606632948 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.606676102 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.606699944 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.606774092 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.606780052 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.606798887 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.606820107 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.606861115 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.606882095 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.606885910 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.606903076 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.606928110 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.606951952 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.607043028 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.607072115 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.607141972 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.607151031 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.607182026 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.607203960 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.607228041 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.607242107 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.607279062 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.607280016 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.607332945 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.607359886 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.607374907 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.607398033 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.607412100 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.607434988 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.607455015 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.607477903 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.607521057 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.607544899 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.607562065 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.607566118 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.607610941 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.607615948 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.607641935 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.607666969 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.607691050 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.607724905 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.607747078 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.607754946 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.607805967 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.607829094 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.607831001 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.607850075 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.607884884 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.607886076 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.607908010 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.607942104 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.607983112 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.607992887 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.608058929 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.608068943 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.608129978 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.612602949 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.612705946 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.612713099 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.612787008 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.613626003 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.613708019 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.613714933 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.613758087 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.613794088 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.613805056 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.613852024 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.613873959 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.613879919 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.613934994 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.613960028 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.613976002 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.614007950 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.614029884 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.614042044 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.614078999 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.614082098 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.614115953 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.614142895 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.614151001 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.614187956 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.614211082 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.614228010 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.614265919 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.614291906 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.614303112 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.614339113 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.614371061 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.614389896 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.614415884 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.614434004 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.614444971 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.614470005 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.614495039 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.614516973 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.614521027 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.614547968 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.614574909 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.614603996 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.614629984 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.614634037 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.614672899 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.614676952 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.614711046 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.614733934 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.614752054 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.614800930 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.614803076 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.614856005 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.614883900 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.614892960 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.614937067 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.614969015 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.614969015 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.615004063 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615041971 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.615045071 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615082979 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615107059 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.615150928 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615173101 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.615185976 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615231991 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615266085 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.615287066 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615312099 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615318060 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.615326881 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615348101 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615370035 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615390062 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615403891 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.615411043 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615433931 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615454912 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615473986 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615477085 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.615495920 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615516901 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615535021 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.615536928 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615561008 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615586042 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615598917 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.615607977 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615634918 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615655899 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615678072 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615684032 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.615700960 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615724087 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615741014 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.615746021 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615762949 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615781069 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615798950 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615799904 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.615814924 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615830898 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615847111 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615860939 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.615863085 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615919113 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615920067 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.615937948 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615955114 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.615976095 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.616039038 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.616051912 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.616091967 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.616117001 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.616179943 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.616189957 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.616219044 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.616240978 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.616249084 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.616261959 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.616285086 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.616300106 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.616305113 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.616344929 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.616370916 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.616381884 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.616417885 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.616425991 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.616457939 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.616497993 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.616564035 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.616578102 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.616589069 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.616610050 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.616661072 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.616662025 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.616684914 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.616707087 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.616743088 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.616744995 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.616761923 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.616791010 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.616811991 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.616816998 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.616831064 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.616854906 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.616888046 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.616935015 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.616947889 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.616966963 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.617027998 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.617058039 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.617094040 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.617124081 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.617151976 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.617176056 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.617197990 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.617198944 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.617219925 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.617240906 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.617253065 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.617259979 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.617280006 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.617332935 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.617352009 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.617399931 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.617461920 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.617481947 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.617530107 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.617600918 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.617630959 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.617650032 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.617671967 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.617693901 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.617698908 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.617716074 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.617743969 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.617764950 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.617794991 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.617806911 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.617820024 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.617839098 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.617856979 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.617889881 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.617906094 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.617954969 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.617959023 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.617978096 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.618007898 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.618014097 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.618038893 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.618066072 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.618072987 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.618134022 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.618151903 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.618177891 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.618201971 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.618202925 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.618230104 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.618257999 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.618259907 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.618280888 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.618304014 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.618313074 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.618326902 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.618349075 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.618349075 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.618371010 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.618380070 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.618390083 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.618411064 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.618428946 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.618432045 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.618455887 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.618479013 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.618482113 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.618501902 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.618515015 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.618541002 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.618576050 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.618607044 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.618863106 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.618890047 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.618908882 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.618927002 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.618931055 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.618959904 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.618971109 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.618988037 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.619004011 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.619055986 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.619091034 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.619146109 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.619178057 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.619193077 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.619206905 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.619230986 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.765065908 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.765394926 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.765688896 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.765791893 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.765888929 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.765917063 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.765938997 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.765975952 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.765980005 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.766060114 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.766127110 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.766181946 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.766205072 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.766228914 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.766230106 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.766275883 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.766294956 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.766294956 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.766318083 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.766367912 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.766426086 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.766705990 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.766755104 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.766777992 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.766813993 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.766824961 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.766832113 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.766855001 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.766877890 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.766908884 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.766938925 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.766984940 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.767026901 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.767059088 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.767060041 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.767085075 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.767106056 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.767143965 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.767169952 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.767180920 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.767193079 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.767261028 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.767266989 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.767291069 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.767313004 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.767334938 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.767345905 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.767357111 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.767398119 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.767452955 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.767461061 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.767486095 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.767508984 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.767533064 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.767534018 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.767601013 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.770558119 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.770646095 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.770653009 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.770848036 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.773947001 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.773988008 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.774012089 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.774039030 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.774051905 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.774102926 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.774133921 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.774162054 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.774210930 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.774362087 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.774390936 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.774405956 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.774427891 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.774430037 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.774477959 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.774502039 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.774544954 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.774554014 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.774586916 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.774620056 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.774632931 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.774669886 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.774702072 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.774709940 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.774764061 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.774787903 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.774823904 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.774851084 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.774873018 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.774873972 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.774929047 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.774938107 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.774962902 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.774986982 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.775039911 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.775096893 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.775103092 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.775105000 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.775134087 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.775156021 CEST44349726207.241.228.150192.168.2.3
                        Jul 12, 2021 15:20:42.775161028 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:20:42.775202036 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:21:03.382239103 CEST49725443192.168.2.3207.241.224.2
                        Jul 12, 2021 15:21:03.382384062 CEST49724443192.168.2.3207.241.224.2
                        Jul 12, 2021 15:21:03.382606983 CEST49726443192.168.2.3207.241.228.150
                        Jul 12, 2021 15:21:03.382858992 CEST49727443192.168.2.3207.241.228.150

                        UDP Packets

                        TimestampSource PortDest PortSource IPDest IP
                        Jul 12, 2021 15:20:30.792671919 CEST5836153192.168.2.38.8.8.8
                        Jul 12, 2021 15:20:30.805702925 CEST53583618.8.8.8192.168.2.3
                        Jul 12, 2021 15:20:31.817423105 CEST6349253192.168.2.38.8.8.8
                        Jul 12, 2021 15:20:31.834106922 CEST53634928.8.8.8192.168.2.3
                        Jul 12, 2021 15:20:33.091845036 CEST6083153192.168.2.38.8.8.8
                        Jul 12, 2021 15:20:33.106437922 CEST53608318.8.8.8192.168.2.3
                        Jul 12, 2021 15:20:33.830226898 CEST6010053192.168.2.38.8.8.8
                        Jul 12, 2021 15:20:33.844559908 CEST53601008.8.8.8192.168.2.3
                        Jul 12, 2021 15:20:34.828819990 CEST5319553192.168.2.38.8.8.8
                        Jul 12, 2021 15:20:34.841103077 CEST53531958.8.8.8192.168.2.3
                        Jul 12, 2021 15:20:36.049758911 CEST5014153192.168.2.38.8.8.8
                        Jul 12, 2021 15:20:36.063311100 CEST53501418.8.8.8192.168.2.3
                        Jul 12, 2021 15:20:37.093735933 CEST5302353192.168.2.38.8.8.8
                        Jul 12, 2021 15:20:37.107237101 CEST53530238.8.8.8192.168.2.3
                        Jul 12, 2021 15:20:38.088161945 CEST4956353192.168.2.38.8.8.8
                        Jul 12, 2021 15:20:38.102972031 CEST53495638.8.8.8192.168.2.3
                        Jul 12, 2021 15:20:38.321455956 CEST5135253192.168.2.38.8.8.8
                        Jul 12, 2021 15:20:38.381149054 CEST53513528.8.8.8192.168.2.3
                        Jul 12, 2021 15:20:39.530738115 CEST5934953192.168.2.38.8.8.8
                        Jul 12, 2021 15:20:39.543806076 CEST53593498.8.8.8192.168.2.3
                        Jul 12, 2021 15:20:39.749670982 CEST5708453192.168.2.38.8.8.8
                        Jul 12, 2021 15:20:39.763417959 CEST53570848.8.8.8192.168.2.3
                        Jul 12, 2021 15:20:40.346354961 CEST5882353192.168.2.38.8.8.8
                        Jul 12, 2021 15:20:40.374916077 CEST53588238.8.8.8192.168.2.3
                        Jul 12, 2021 15:20:40.558942080 CEST5756853192.168.2.38.8.8.8
                        Jul 12, 2021 15:20:40.571894884 CEST53575688.8.8.8192.168.2.3
                        Jul 12, 2021 15:20:42.148948908 CEST5054053192.168.2.38.8.8.8
                        Jul 12, 2021 15:20:42.162688017 CEST53505408.8.8.8192.168.2.3
                        Jul 12, 2021 15:20:44.887959003 CEST5436653192.168.2.38.8.8.8
                        Jul 12, 2021 15:20:44.901201963 CEST53543668.8.8.8192.168.2.3
                        Jul 12, 2021 15:20:46.259274006 CEST5303453192.168.2.38.8.8.8
                        Jul 12, 2021 15:20:46.272397995 CEST53530348.8.8.8192.168.2.3
                        Jul 12, 2021 15:20:47.213666916 CEST5776253192.168.2.38.8.8.8
                        Jul 12, 2021 15:20:47.227446079 CEST53577628.8.8.8192.168.2.3
                        Jul 12, 2021 15:20:48.297440052 CEST5543553192.168.2.38.8.8.8
                        Jul 12, 2021 15:20:48.310853958 CEST53554358.8.8.8192.168.2.3
                        Jul 12, 2021 15:20:50.875387907 CEST5071353192.168.2.38.8.8.8
                        Jul 12, 2021 15:20:50.889250040 CEST53507138.8.8.8192.168.2.3
                        Jul 12, 2021 15:20:53.018423080 CEST5613253192.168.2.38.8.8.8
                        Jul 12, 2021 15:20:53.031266928 CEST53561328.8.8.8192.168.2.3
                        Jul 12, 2021 15:21:01.366873980 CEST5898753192.168.2.38.8.8.8
                        Jul 12, 2021 15:21:01.393691063 CEST53589878.8.8.8192.168.2.3
                        Jul 12, 2021 15:21:01.716191053 CEST5657953192.168.2.38.8.8.8
                        Jul 12, 2021 15:21:01.728946924 CEST53565798.8.8.8192.168.2.3
                        Jul 12, 2021 15:21:08.386976957 CEST6063353192.168.2.38.8.8.8
                        Jul 12, 2021 15:21:08.400981903 CEST53606338.8.8.8192.168.2.3
                        Jul 12, 2021 15:21:09.396245003 CEST6063353192.168.2.38.8.8.8
                        Jul 12, 2021 15:21:09.409037113 CEST53606338.8.8.8192.168.2.3
                        Jul 12, 2021 15:21:10.398161888 CEST6063353192.168.2.38.8.8.8
                        Jul 12, 2021 15:21:10.411336899 CEST53606338.8.8.8192.168.2.3
                        Jul 12, 2021 15:21:12.412054062 CEST6063353192.168.2.38.8.8.8
                        Jul 12, 2021 15:21:12.427480936 CEST53606338.8.8.8192.168.2.3
                        Jul 12, 2021 15:21:16.459386110 CEST6063353192.168.2.38.8.8.8
                        Jul 12, 2021 15:21:16.472527981 CEST53606338.8.8.8192.168.2.3
                        Jul 12, 2021 15:21:24.964405060 CEST6129253192.168.2.38.8.8.8
                        Jul 12, 2021 15:21:24.966015100 CEST6361953192.168.2.38.8.8.8
                        Jul 12, 2021 15:21:24.980519056 CEST53636198.8.8.8192.168.2.3
                        Jul 12, 2021 15:21:25.166039944 CEST53612928.8.8.8192.168.2.3
                        Jul 12, 2021 15:21:25.386383057 CEST6493853192.168.2.38.8.8.8
                        Jul 12, 2021 15:21:25.400024891 CEST53649388.8.8.8192.168.2.3
                        Jul 12, 2021 15:21:25.765654087 CEST6194653192.168.2.38.8.8.8
                        Jul 12, 2021 15:21:25.781270027 CEST53619468.8.8.8192.168.2.3
                        Jul 12, 2021 15:21:26.267199039 CEST6491053192.168.2.38.8.8.8
                        Jul 12, 2021 15:21:26.416455030 CEST53649108.8.8.8192.168.2.3
                        Jul 12, 2021 15:21:26.852766991 CEST5212353192.168.2.38.8.8.8
                        Jul 12, 2021 15:21:26.868109941 CEST53521238.8.8.8192.168.2.3
                        Jul 12, 2021 15:21:27.282469034 CEST5613053192.168.2.38.8.8.8
                        Jul 12, 2021 15:21:27.295367956 CEST53561308.8.8.8192.168.2.3
                        Jul 12, 2021 15:21:27.961738110 CEST5633853192.168.2.38.8.8.8
                        Jul 12, 2021 15:21:28.096267939 CEST53563388.8.8.8192.168.2.3
                        Jul 12, 2021 15:21:28.518156052 CEST5942053192.168.2.38.8.8.8
                        Jul 12, 2021 15:21:28.534601927 CEST53594208.8.8.8192.168.2.3
                        Jul 12, 2021 15:21:29.184117079 CEST5878453192.168.2.38.8.8.8
                        Jul 12, 2021 15:21:29.202024937 CEST53587848.8.8.8192.168.2.3
                        Jul 12, 2021 15:21:33.440294981 CEST6397853192.168.2.38.8.8.8
                        Jul 12, 2021 15:21:33.463110924 CEST53639788.8.8.8192.168.2.3
                        Jul 12, 2021 15:21:44.506182909 CEST6293853192.168.2.38.8.8.8
                        Jul 12, 2021 15:21:44.539284945 CEST53629388.8.8.8192.168.2.3
                        Jul 12, 2021 15:21:45.395500898 CEST5570853192.168.2.38.8.8.8
                        Jul 12, 2021 15:21:45.408652067 CEST53557088.8.8.8192.168.2.3
                        Jul 12, 2021 15:21:46.078598976 CEST5680353192.168.2.38.8.8.8
                        Jul 12, 2021 15:21:46.092247963 CEST53568038.8.8.8192.168.2.3
                        Jul 12, 2021 15:22:14.780457020 CEST5714553192.168.2.38.8.8.8
                        Jul 12, 2021 15:22:14.794770002 CEST53571458.8.8.8192.168.2.3
                        Jul 12, 2021 15:22:17.831793070 CEST5535953192.168.2.38.8.8.8
                        Jul 12, 2021 15:22:17.858563900 CEST53553598.8.8.8192.168.2.3

                        DNS Queries

                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                        Jul 12, 2021 15:20:39.749670982 CEST192.168.2.38.8.8.80x1d1dStandard query (0)archive.orgA (IP address)IN (0x0001)
                        Jul 12, 2021 15:20:40.346354961 CEST192.168.2.38.8.8.80xe487Standard query (0)ia801500.us.archive.orgA (IP address)IN (0x0001)

                        DNS Answers

                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                        Jul 12, 2021 15:20:39.763417959 CEST8.8.8.8192.168.2.30x1d1dNo error (0)archive.org207.241.224.2A (IP address)IN (0x0001)
                        Jul 12, 2021 15:20:40.374916077 CEST8.8.8.8192.168.2.30xe487No error (0)ia801500.us.archive.org207.241.228.150A (IP address)IN (0x0001)

                        HTTPS Packets

                        TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                        Jul 12, 2021 15:20:40.103854895 CEST207.241.224.2443192.168.2.349724CN=*.archive.org, OU=Domain Control Validated CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=USCN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=US OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=USMon Dec 23 14:16:33 CET 2019 Tue May 03 09:00:00 CEST 2011 Wed Jan 01 08:00:00 CET 2014 Tue Jun 29 19:06:20 CEST 2004Mon Feb 21 23:56:08 CET 2022 Sat May 03 09:00:00 CEST 2031 Fri May 30 09:00:00 CEST 2031 Thu Jun 29 19:06:20 CEST 2034771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-16-23-24-65281,29-23-24,09e10692f1b7f78228b2d4e424db3a98c
                        CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=USCN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=USTue May 03 09:00:00 CEST 2011Sat May 03 09:00:00 CEST 2031
                        CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=USOU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=USWed Jan 01 08:00:00 CET 2014Fri May 30 09:00:00 CEST 2031
                        OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=USOU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=USTue Jun 29 19:06:20 CEST 2004Thu Jun 29 19:06:20 CEST 2034
                        Jul 12, 2021 15:20:40.104886055 CEST207.241.224.2443192.168.2.349725CN=*.archive.org, OU=Domain Control Validated CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=USCN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=US OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=USMon Dec 23 14:16:33 CET 2019 Tue May 03 09:00:00 CEST 2011 Wed Jan 01 08:00:00 CET 2014 Tue Jun 29 19:06:20 CEST 2004Mon Feb 21 23:56:08 CET 2022 Sat May 03 09:00:00 CEST 2031 Fri May 30 09:00:00 CEST 2031 Thu Jun 29 19:06:20 CEST 2034771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-16-23-24-65281,29-23-24,09e10692f1b7f78228b2d4e424db3a98c
                        CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=USCN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=USTue May 03 09:00:00 CEST 2011Sat May 03 09:00:00 CEST 2031
                        CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=USOU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=USWed Jan 01 08:00:00 CET 2014Fri May 30 09:00:00 CEST 2031
                        OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=USOU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=USTue Jun 29 19:06:20 CEST 2004Thu Jun 29 19:06:20 CEST 2034
                        Jul 12, 2021 15:20:40.732563019 CEST207.241.228.150443192.168.2.349726CN=*.us.archive.org, OU=Domain Control Validated CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=USCN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=US OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=USMon Dec 23 14:16:32 CET 2019 Tue May 03 09:00:00 CEST 2011 Wed Jan 01 08:00:00 CET 2014 Tue Jun 29 19:06:20 CEST 2004Mon Feb 21 23:56:17 CET 2022 Sat May 03 09:00:00 CEST 2031 Fri May 30 09:00:00 CEST 2031 Thu Jun 29 19:06:20 CEST 2034771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-16-23-24-65281,29-23-24,09e10692f1b7f78228b2d4e424db3a98c
                        CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=USCN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=USTue May 03 09:00:00 CEST 2011Sat May 03 09:00:00 CEST 2031
                        CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=USOU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=USWed Jan 01 08:00:00 CET 2014Fri May 30 09:00:00 CEST 2031
                        OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=USOU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=USTue Jun 29 19:06:20 CEST 2004Thu Jun 29 19:06:20 CEST 2034
                        Jul 12, 2021 15:20:40.734802008 CEST207.241.228.150443192.168.2.349727CN=*.us.archive.org, OU=Domain Control Validated CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=USCN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=US OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=USMon Dec 23 14:16:32 CET 2019 Tue May 03 09:00:00 CEST 2011 Wed Jan 01 08:00:00 CET 2014 Tue Jun 29 19:06:20 CEST 2004Mon Feb 21 23:56:17 CET 2022 Sat May 03 09:00:00 CEST 2031 Fri May 30 09:00:00 CEST 2031 Thu Jun 29 19:06:20 CEST 2034771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-16-23-24-65281,29-23-24,09e10692f1b7f78228b2d4e424db3a98c
                        CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=USCN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=USTue May 03 09:00:00 CEST 2011Sat May 03 09:00:00 CEST 2031
                        CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=USOU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=USWed Jan 01 08:00:00 CET 2014Fri May 30 09:00:00 CEST 2031
                        OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=USOU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=USTue Jun 29 19:06:20 CEST 2004Thu Jun 29 19:06:20 CEST 2034

                        Code Manipulations

                        Statistics

                        CPU Usage

                        Click to jump to process

                        Memory Usage

                        Click to jump to process

                        High Level Behavior Distribution

                        Click to dive into process behavior distribution

                        Behavior

                        Click to jump to process

                        System Behavior

                        General

                        Start time:15:20:37
                        Start date:12/07/2021
                        Path:C:\Program Files\internet explorer\iexplore.exe
                        Wow64 process (32bit):false
                        Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                        Imagebase:0x7ff6d10c0000
                        File size:823560 bytes
                        MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low

                        General

                        Start time:15:20:38
                        Start date:12/07/2021
                        Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        Wow64 process (32bit):true
                        Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2332 CREDAT:17410 /prefetch:2
                        Imagebase:0xf80000
                        File size:822536 bytes
                        MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low

                        General

                        Start time:15:21:03
                        Start date:12/07/2021
                        Path:C:\Windows\SysWOW64\unarchiver.exe
                        Wow64 process (32bit):true
                        Commandline:'C:\Windows\SysWOW64\unarchiver.exe' 'C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\MCOPY.tar'
                        Imagebase:0xbb0000
                        File size:10240 bytes
                        MD5 hash:DB55139D9DD29F24AE8EA8F0E5606901
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:.Net C# or VB.NET
                        Reputation:low

                        General

                        Start time:15:21:04
                        Start date:12/07/2021
                        Path:C:\Windows\SysWOW64\7za.exe
                        Wow64 process (32bit):true
                        Commandline:'C:\Windows\System32\7za.exe' x -pinfected -y -o'C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x' 'C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\MCOPY.tar'
                        Imagebase:0xbf0000
                        File size:289792 bytes
                        MD5 hash:77E556CDFDC5C592F5C46DB4127C6F4C
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low

                        General

                        Start time:15:21:04
                        Start date:12/07/2021
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff6b2800000
                        File size:625664 bytes
                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low

                        General

                        Start time:15:21:05
                        Start date:12/07/2021
                        Path:C:\Windows\SysWOW64\cmd.exe
                        Wow64 process (32bit):true
                        Commandline:'cmd.exe' /C 'C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exe'
                        Imagebase:0xbd0000
                        File size:232960 bytes
                        MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low

                        General

                        Start time:15:21:06
                        Start date:12/07/2021
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff6b2800000
                        File size:625664 bytes
                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low

                        General

                        Start time:15:21:06
                        Start date:12/07/2021
                        Path:C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Users\user\AppData\Local\Temp\fyhuigp3.w2x\RJCGQP.exe
                        Imagebase:0x1330000
                        File size:1573376 bytes
                        MD5 hash:AD4B4A3179D923A637CEB9AC2E1CB00A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Antivirus matches:
                        • Detection: 100%, Avira
                        • Detection: 48%, ReversingLabs
                        Reputation:low

                        General

                        Start time:15:21:08
                        Start date:12/07/2021
                        Path:C:\Windows\SysWOW64\cmd.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\system32\cmd.exe /c A.exe /stext A.txt
                        Imagebase:0xbd0000
                        File size:232960 bytes
                        MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low

                        General

                        Start time:15:21:08
                        Start date:12/07/2021
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff6b2800000
                        File size:625664 bytes
                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low

                        General

                        Start time:15:21:09
                        Start date:12/07/2021
                        Path:C:\Users\user\AppData\Local\Temp\A.exe
                        Wow64 process (32bit):true
                        Commandline:A.exe /stext A.txt
                        Imagebase:0x400000
                        File size:227840 bytes
                        MD5 hash:8104093918B6F2D2004535B24B1533BA
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Author: Joe Security
                        Antivirus matches:
                        • Detection: 100%, Joe Sandbox ML
                        • Detection: 32%, Metadefender, Browse
                        • Detection: 79%, ReversingLabs
                        Reputation:low

                        General

                        Start time:15:21:20
                        Start date:12/07/2021
                        Path:C:\Windows\SysWOW64\cmd.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\system32\cmd.exe /c B.exe /stext B.txt
                        Imagebase:0xbd0000
                        File size:232960 bytes
                        MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low

                        General

                        Start time:15:21:20
                        Start date:12/07/2021
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff6b2800000
                        File size:625664 bytes
                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low

                        General

                        Start time:15:21:21
                        Start date:12/07/2021
                        Path:C:\Users\user\AppData\Local\Temp\B.exe
                        Wow64 process (32bit):true
                        Commandline:B.exe /stext B.txt
                        Imagebase:0x400000
                        File size:195584 bytes
                        MD5 hash:62B2864C32CB33F57A65F47269D91BE4
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Author: Joe Security
                        Antivirus matches:
                        • Detection: 100%, Joe Sandbox ML
                        • Detection: 29%, Metadefender, Browse
                        • Detection: 72%, ReversingLabs
                        Reputation:low

                        Disassembly

                        Code Analysis

                        Reset < >

                          Execution Graph

                          Execution Coverage:22%
                          Dynamic/Decrypted Code Coverage:100%
                          Signature Coverage:6%
                          Total number of Nodes:67
                          Total number of Limit Nodes:4

                          Graph

                          execution_graph 1142 14aa448 1143 14aa46a CreateDirectoryW 1142->1143 1145 14aa4b7 1143->1145 1104 14aa88e 1105 14aa8c3 ReadFile 1104->1105 1107 14aa8f5 1105->1107 1112 14ab042 1113 14ab06e GetSystemInfo 1112->1113 1114 14ab0a4 1112->1114 1115 14ab07c 1113->1115 1114->1113 1116 14aa642 1117 14aa66e FindCloseChangeNotification 1116->1117 1118 14aa6ad 1116->1118 1119 14aa67c 1117->1119 1118->1117 1166 14aa600 1168 14aa60e FindCloseChangeNotification 1166->1168 1169 14aa67c 1168->1169 1170 14aa504 1172 14aa52a CreateFileW 1170->1172 1173 14aa5b1 1172->1173 1124 14aa25e 1125 14aa28a SetErrorMode 1124->1125 1126 14aa2b3 1124->1126 1127 14aa29f 1125->1127 1126->1125 1128 14aae1e 1129 14aae4a FindClose 1128->1129 1130 14aae7c 1128->1130 1131 14aae5f 1129->1131 1130->1129 1146 14aa85f 1147 14aa88e ReadFile 1146->1147 1149 14aa8f5 1147->1149 1092 14aa46a 1094 14aa490 CreateDirectoryW 1092->1094 1095 14aa4b7 1094->1095 1096 14aa52a 1097 14aa562 CreateFileW 1096->1097 1099 14aa5b1 1097->1099 1108 14aa7ae 1110 14aa7e3 SetFilePointer 1108->1110 1111 14aa812 1110->1111 1150 14aa9e2 1151 14aaa52 CreatePipe 1150->1151 1153 14aaaaa 1151->1153 1174 14aa120 1175 14aa172 FindNextFileW 1174->1175 1177 14aa1ca 1175->1177 1178 14ab020 1180 14ab042 GetSystemInfo 1178->1180 1181 14ab07c 1180->1181 1182 14aa6bb 1183 14aa6ee GetFileType 1182->1183 1185 14aa750 1183->1185 1154 14aa77c 1155 14aa7ae SetFilePointer 1154->1155 1157 14aa812 1155->1157 1186 14aa23c 1188 14aa25e SetErrorMode 1186->1188 1189 14aa29f 1188->1189 1135 14aa172 1136 14aa1c2 FindNextFileW 1135->1136 1137 14aa1ca 1136->1137 1158 14aab70 1160 14aab96 DuplicateHandle 1158->1160 1161 14aac1b 1160->1161 1162 14aadf7 1163 14aae1e FindClose 1162->1163 1165 14aae5f 1163->1165

                          Callgraph

                          • Executed
                          • Not Executed
                          • Opacity -> Relevance
                          • Disassembly available
                          callgraph 0 Function_014AA448 1 Function_05360C30 2 Function_014AB042 3 Function_014AA642 4 Function_014A2044 5 Function_05360E38 96 Function_05360AD8 5->96 6 Function_014A2458 7 Function_014A2C58 8 Function_02E205F6 9 Function_014AA25E 10 Function_014AA85F 11 Function_014AAA52 12 Function_02E207F8 13 Function_014AA46A 14 Function_014AAD6C 15 Function_02E205CF 16 Function_014A2264 17 Function_014A2364 18 Function_05360A18 19 Function_05360006 20 Function_014AA37B 21 Function_014AA078 22 Function_014AA77C 23 Function_014AA172 24 Function_014AA972 25 Function_014AAB70 26 Function_014AAC71 27 Function_05360A08 28 Function_02E207A2 29 Function_014AB30A 30 Function_014AB20A 31 Function_02E207A6 32 Function_05360070 33 Function_014AA600 34 Function_02E204AE 35 Function_014A2006 36 Function_02E205AF 75 Function_02E2065A 36->75 37 Function_014AA504 38 Function_014AA005 39 Function_014AAD1E 40 Function_014AAE1E 41 Function_014A2310 42 Function_02E205BF 43 Function_014AA52A 44 Function_014AA02E 45 Function_014AA120 46 Function_014AB020 47 Function_014A213C 48 Function_014AA23C 49 Function_014A2430 50 Function_014AA937 51 Function_05360E48 51->96 52 Function_014AAFC9 53 Function_05360BBF 54 Function_05360EBF 54->96 55 Function_014AA2C1 56 Function_02E2066F 57 Function_02E20872 58 Function_014AAAD8 59 Function_05360BA3 60 Function_02E20774 61 Function_014AA3D2 62 Function_014A20D0 63 Function_014AB2D7 64 Function_053602A8 64->1 64->8 64->15 64->34 64->36 64->42 64->96 65 Function_014AA6EE 66 Function_014AB0E2 67 Function_014AA9E2 68 Function_0536099F 69 Function_014AACE3 70 Function_05360299 70->1 70->8 70->15 70->34 70->36 70->42 70->96 71 Function_014AAAFA 72 Function_014AA4FE 73 Function_02E20054 74 Function_014AA2F2 76 Function_014A21F0 77 Function_014AADF7 78 Function_014A23F4 79 Function_014AA1F4 80 Function_02E2025D 81 Function_014AAE8A 82 Function_014AA88E 83 Function_014AAD8E 84 Function_014AAF8D 85 Function_014A2680 86 Function_014AA09A 87 Function_014A2098 88 Function_014AAB96 89 Function_05360DEA 89->96 90 Function_02E2063C 90->75 91 Function_014A2194 92 Function_02E20002 93 Function_014AA7AE 94 Function_05360ED0 94->96 95 Function_02E20708 96->53 97 Function_014AA6BB 98 Function_014AAEBE 99 Function_014A23BC 100 Function_014AB1BD 101 Function_014AB0B2 102 Function_02E2081E 103 Function_05360ACA 104 Function_014A22B4

                          Executed Functions

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 53602a8-53602d1 1 53602d3 0->1 2 53602d8-5360377 0->2 1->2 7 536037e-53603a2 2->7 8 5360379 2->8 10 5360591-53605b1 7->10 11 53603a8-53603c3 7->11 8->7 14 53605b7-53605c5 10->14 15 536098b-536099d 10->15 16 536057b-5360589 11->16 17 53603c9-5360579 11->17 18 53605c7 14->18 19 53605cc-53605da 14->19 25 53609f5-53609fe 15->25 23 536058a-536099d 16->23 17->23 18->19 103 53605e0 call 2e205f6 19->103 104 53605e0 call 2e204ae 19->104 105 53605e0 call 2e205cf 19->105 106 53605e0 call 2e205af 19->106 107 53605e0 call 2e205bf 19->107 108 53605e0 call 5360ad8 19->108 23->25 28 53605e6-5360681 call 5360ad8 44 5360683 28->44 45 5360688-5360785 call 5360c30 call 5360ad8 * 2 28->45 44->45 63 5360940-5360956 45->63 64 536095c-536096d 63->64 65 536078a-5360793 63->65 68 5360987-5360989 64->68 69 536096f-5360986 64->69 66 5360795 65->66 67 536079a-53607b3 65->67 66->67 70 536092c-5360932 67->70 71 53607b9-53607ef 67->71 69->68 72 5360934 70->72 73 5360939-536093d 70->73 78 53607f5 71->78 79 53607f1-53607f3 71->79 72->73 73->63 80 53607fa-5360801 78->80 79->80 81 5360807-536081c 80->81 82 5360908-536092a 80->82 83 5360890-53608a6 81->83 92 536092b 82->92 84 536081e-5360827 83->84 85 53608ac-53608bd 83->85 89 536082e-5360881 84->89 90 5360829 84->90 87 5360904-5360906 85->87 88 53608bf-53608ec call 5360ad8 call 5360c30 85->88 87->92 97 53608f2-53608f9 88->97 101 5360883-536088b 89->101 102 536088c-536088d 89->102 90->89 92->70 99 5360900-5360903 97->99 100 53608fb 97->100 99->87 100->99 101->102 102->83 103->28 104->28 105->28 106->28 107->28 108->28
                          Strings
                          Memory Dump Source
                          • Source File: 00000007.00000002.332288736.0000000005360000.00000040.00000001.sdmp, Offset: 05360000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_5360000_unarchiver.jbxd
                          Similarity
                          • API ID:
                          • String ID: :@:r$X1ar$u]-p^
                          • API String ID: 0-4124039667
                          • Opcode ID: 6f528bc06a08e4ba2ff982316008723954cf7aecb921da4784b26c5bbb053644
                          • Instruction ID: 8b2327382301fa1eebe30390898946b87f419c69668d205e03f07d578784c533
                          • Opcode Fuzzy Hash: 6f528bc06a08e4ba2ff982316008723954cf7aecb921da4784b26c5bbb053644
                          • Instruction Fuzzy Hash: E222D774E00218DFDB14DFA6D888B9DBBB2FF89301F1095AAD809A7255DB349D85CF60
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetSystemInfo.KERNELBASE(?), ref: 014AB074
                          Memory Dump Source
                          • Source File: 00000007.00000002.330922034.00000000014AA000.00000040.00000001.sdmp, Offset: 014AA000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_14aa000_unarchiver.jbxd
                          Similarity
                          • API ID: InfoSystem
                          • String ID:
                          • API String ID: 31276548-0
                          • Opcode ID: 1500c856e2b06a91a29e14b6ca8c757c8db309911f12afb4ed4f821072e5c982
                          • Instruction ID: 6f14d9fda08d5920ce696456ce87b15fd9fd86e82f7a78fb40a2940b71ee756b
                          • Opcode Fuzzy Hash: 1500c856e2b06a91a29e14b6ca8c757c8db309911f12afb4ed4f821072e5c982
                          • Instruction Fuzzy Hash: AF01ADB4804244DFDB10CF29D884766FFE4EF44320F98C4ABDE489F266D2B5A408CB62
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 115 14ab0b2-14ab157 120 14ab159-14ab161 DuplicateHandle 115->120 121 14ab1af-14ab1b4 115->121 123 14ab167-14ab179 120->123 121->120 124 14ab17b-14ab1ac 123->124 125 14ab1b6-14ab1bb 123->125 125->124
                          APIs
                          • DuplicateHandle.KERNELBASE(?,00000E2C), ref: 014AB15F
                          Memory Dump Source
                          • Source File: 00000007.00000002.330922034.00000000014AA000.00000040.00000001.sdmp, Offset: 014AA000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_14aa000_unarchiver.jbxd
                          Similarity
                          • API ID: DuplicateHandle
                          • String ID:
                          • API String ID: 3793708945-0
                          • Opcode ID: bea91b33aa3f6b0faea8ffaedd004f18502c3e63668e095f9da386a2f2761f25
                          • Instruction ID: 7906fff6f87042484e5d8adcd5acc7930ecd2e7deab46d39bd4d0711c26f60e0
                          • Opcode Fuzzy Hash: bea91b33aa3f6b0faea8ffaedd004f18502c3e63668e095f9da386a2f2761f25
                          • Instruction Fuzzy Hash: A331B272404344AFEB228F65DC44F67BFACEF46320F04899BF985DB162D224A819CB71
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 129 14aab70-14aac0b 134 14aac0d-14aac15 DuplicateHandle 129->134 135 14aac63-14aac68 129->135 137 14aac1b-14aac2d 134->137 135->134 138 14aac6a-14aac6f 137->138 139 14aac2f-14aac60 137->139 138->139
                          APIs
                          • DuplicateHandle.KERNELBASE(?,00000E2C), ref: 014AAC13
                          Memory Dump Source
                          • Source File: 00000007.00000002.330922034.00000000014AA000.00000040.00000001.sdmp, Offset: 014AA000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_14aa000_unarchiver.jbxd
                          Similarity
                          • API ID: DuplicateHandle
                          • String ID:
                          • API String ID: 3793708945-0
                          • Opcode ID: b71dc8c5d5d7decf995e591d7d4b4fefe3a5c7749b2259265d36903c8cc3f0ea
                          • Instruction ID: 634d25ad635eb9c6138fe87f3480ef2a896be77e3e9b318c0caaf5732b6bdbe1
                          • Opcode Fuzzy Hash: b71dc8c5d5d7decf995e591d7d4b4fefe3a5c7749b2259265d36903c8cc3f0ea
                          • Instruction Fuzzy Hash: FD31B572404344AFEB228F65DC44F67BFACEF46720F0488ABF985DB152D224A415DB61
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 143 14aa504-14aa582 147 14aa587-14aa593 143->147 148 14aa584 143->148 149 14aa598-14aa5a1 147->149 150 14aa595 147->150 148->147 151 14aa5f2-14aa5f7 149->151 152 14aa5a3-14aa5c7 CreateFileW 149->152 150->149 151->152 155 14aa5f9-14aa5fe 152->155 156 14aa5c9-14aa5ef 152->156 155->156
                          APIs
                          • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 014AA5A9
                          Memory Dump Source
                          • Source File: 00000007.00000002.330922034.00000000014AA000.00000040.00000001.sdmp, Offset: 014AA000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_14aa000_unarchiver.jbxd
                          Similarity
                          • API ID: CreateFile
                          • String ID:
                          • API String ID: 823142352-0
                          • Opcode ID: d775c499a09efb5493d42d79fd0d1d01da4b4860e7e7b736bc570f8b6892904b
                          • Instruction ID: ff8830e19f88138acbdab6362b42e18efbcf53d565648f4c6b2737cf255bde6f
                          • Opcode Fuzzy Hash: d775c499a09efb5493d42d79fd0d1d01da4b4860e7e7b736bc570f8b6892904b
                          • Instruction Fuzzy Hash: 6F3190B1504380AFE722CF25CC44F66BFE8EF45610F18849EE9858B252D375E805CB71
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 159 14aa9e2-14aaa4f 160 14aaa52-14aaaa4 CreatePipe 159->160 162 14aaaaa-14aaad3 160->162
                          APIs
                          • CreatePipe.KERNELBASE(?,00000E2C,?,?), ref: 014AAAA2
                          Memory Dump Source
                          • Source File: 00000007.00000002.330922034.00000000014AA000.00000040.00000001.sdmp, Offset: 014AA000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_14aa000_unarchiver.jbxd
                          Similarity
                          • API ID: CreatePipe
                          • String ID:
                          • API String ID: 2719314638-0
                          • Opcode ID: 550fa28cff813037e6c6ba5544e7b68fac17cf0ef80afa2f4eef4af28609e4f3
                          • Instruction ID: 3f315beb2a9ca162a9f98bfeeada2964ff41a9a518ca538ee2aa5349e7d8e0a5
                          • Opcode Fuzzy Hash: 550fa28cff813037e6c6ba5544e7b68fac17cf0ef80afa2f4eef4af28609e4f3
                          • Instruction Fuzzy Hash: C0318F6640E3C46FD3138B718C61A55BFB4AF87610F1D84CBD8C48F2A3D2686919C762
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 164 14aa120-14aa1f3 FindNextFileW
                          APIs
                          • FindNextFileW.KERNELBASE(?,00000E2C,?,?), ref: 014AA1C2
                          Memory Dump Source
                          • Source File: 00000007.00000002.330922034.00000000014AA000.00000040.00000001.sdmp, Offset: 014AA000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_14aa000_unarchiver.jbxd
                          Similarity
                          • API ID: FileFindNext
                          • String ID:
                          • API String ID: 2029273394-0
                          • Opcode ID: aa806332eb98fb5af2efff3040fea6ae6b6c238fb839dcfaa3e95a43a646571b
                          • Instruction ID: 500be0e80abce57b1b2982bfa9b119c8d9f6beec3ad0bf40d45f7eb659b3662a
                          • Opcode Fuzzy Hash: aa806332eb98fb5af2efff3040fea6ae6b6c238fb839dcfaa3e95a43a646571b
                          • Instruction Fuzzy Hash: 7821947140D3C06FD7128B758C51B62BFB4EF87620F1985DBE9848F193D225A919C7A2
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 182 14ab0e2-14ab157 186 14ab159-14ab161 DuplicateHandle 182->186 187 14ab1af-14ab1b4 182->187 189 14ab167-14ab179 186->189 187->186 190 14ab17b-14ab1ac 189->190 191 14ab1b6-14ab1bb 189->191 191->190
                          APIs
                          • DuplicateHandle.KERNELBASE(?,00000E2C), ref: 014AB15F
                          Memory Dump Source
                          • Source File: 00000007.00000002.330922034.00000000014AA000.00000040.00000001.sdmp, Offset: 014AA000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_14aa000_unarchiver.jbxd
                          Similarity
                          • API ID: DuplicateHandle
                          • String ID:
                          • API String ID: 3793708945-0
                          • Opcode ID: f1beefe87af888080df4292fd387eaffe579f8b3ac0e70bd5cc8e9828f80028c
                          • Instruction ID: b3e335e322d698b56365a118fefe585994cf7b49fe9d823c4a1eac1c2d92c8cc
                          • Opcode Fuzzy Hash: f1beefe87af888080df4292fd387eaffe579f8b3ac0e70bd5cc8e9828f80028c
                          • Instruction Fuzzy Hash: 5F21CF72500204AFEB219F68DC84F6BFBACEF48320F04896BFE45DB251D670A4098B71
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 169 14aab96-14aac0b 173 14aac0d-14aac15 DuplicateHandle 169->173 174 14aac63-14aac68 169->174 176 14aac1b-14aac2d 173->176 174->173 177 14aac6a-14aac6f 176->177 178 14aac2f-14aac60 176->178 177->178
                          APIs
                          • DuplicateHandle.KERNELBASE(?,00000E2C), ref: 014AAC13
                          Memory Dump Source
                          • Source File: 00000007.00000002.330922034.00000000014AA000.00000040.00000001.sdmp, Offset: 014AA000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_14aa000_unarchiver.jbxd
                          Similarity
                          • API ID: DuplicateHandle
                          • String ID:
                          • API String ID: 3793708945-0
                          • Opcode ID: e86753a4f26b45b9f26f8f34639602848d0bf44fcb483f3175c39f87875a1aa4
                          • Instruction ID: 6e9a51639368e7109cec6bfc6222c767ab02218a155a691385526c275b7cbd62
                          • Opcode Fuzzy Hash: e86753a4f26b45b9f26f8f34639602848d0bf44fcb483f3175c39f87875a1aa4
                          • Instruction Fuzzy Hash: 4521B272500604AFFB219F64DC84F6BBBACEF44720F14886BEA459B251D670A409CB61
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 195 14aa77c-14aa802 199 14aa846-14aa84b 195->199 200 14aa804-14aa824 SetFilePointer 195->200 199->200 203 14aa84d-14aa852 200->203 204 14aa826-14aa843 200->204 203->204
                          APIs
                          • SetFilePointer.KERNELBASE(?,00000E2C,2D9C2B8D,00000000,00000000,00000000,00000000), ref: 014AA80A
                          Memory Dump Source
                          • Source File: 00000007.00000002.330922034.00000000014AA000.00000040.00000001.sdmp, Offset: 014AA000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_14aa000_unarchiver.jbxd
                          Similarity
                          • API ID: FilePointer
                          • String ID:
                          • API String ID: 973152223-0
                          • Opcode ID: ce04d9f359cd3e0db18e5b6d590398206e323833ad6c720ca5e31ec530e3e45e
                          • Instruction ID: a9fc0ac6e11baa2d0cfc11ea7485a901e109d37ba818b44f5313584ed81c108d
                          • Opcode Fuzzy Hash: ce04d9f359cd3e0db18e5b6d590398206e323833ad6c720ca5e31ec530e3e45e
                          • Instruction Fuzzy Hash: DF219071408380AFE7128B24DC40F66BFA8EF46720F1984ABE9849B253C264A809C771
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 207 14aa85f-14aa8e5 211 14aa929-14aa92e 207->211 212 14aa8e7-14aa907 ReadFile 207->212 211->212 215 14aa909-14aa926 212->215 216 14aa930-14aa935 212->216 216->215
                          APIs
                          • ReadFile.KERNELBASE(?,00000E2C,2D9C2B8D,00000000,00000000,00000000,00000000), ref: 014AA8ED
                          Memory Dump Source
                          • Source File: 00000007.00000002.330922034.00000000014AA000.00000040.00000001.sdmp, Offset: 014AA000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_14aa000_unarchiver.jbxd
                          Similarity
                          • API ID: FileRead
                          • String ID:
                          • API String ID: 2738559852-0
                          • Opcode ID: 5ff93672fe884c5bf9568d33d217b348f61159af6eef6ac828bf805eaf79ce8f
                          • Instruction ID: f49f6c71ae1668b5bd6f8f7f310846f522d43a8b0d4b163b5d92c6a7382c56f3
                          • Opcode Fuzzy Hash: 5ff93672fe884c5bf9568d33d217b348f61159af6eef6ac828bf805eaf79ce8f
                          • Instruction Fuzzy Hash: 11218371409380AFDB228F65DC44F57BFB8EF46310F18859BEA849F162C275A409CB71
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 219 14aa52a-14aa582 222 14aa587-14aa593 219->222 223 14aa584 219->223 224 14aa598-14aa5a1 222->224 225 14aa595 222->225 223->222 226 14aa5f2-14aa5f7 224->226 227 14aa5a3-14aa5ab CreateFileW 224->227 225->224 226->227 229 14aa5b1-14aa5c7 227->229 230 14aa5f9-14aa5fe 229->230 231 14aa5c9-14aa5ef 229->231 230->231
                          APIs
                          • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 014AA5A9
                          Memory Dump Source
                          • Source File: 00000007.00000002.330922034.00000000014AA000.00000040.00000001.sdmp, Offset: 014AA000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_14aa000_unarchiver.jbxd
                          Similarity
                          • API ID: CreateFile
                          • String ID:
                          • API String ID: 823142352-0
                          • Opcode ID: 1a9cad7fcf30e64e2105daef22b31b75d2c396acfe39bc3a952060b33c6fc718
                          • Instruction ID: 3270d662146b5588c2857d6fa837116f01f225316febbddd0a07060a414bd349
                          • Opcode Fuzzy Hash: 1a9cad7fcf30e64e2105daef22b31b75d2c396acfe39bc3a952060b33c6fc718
                          • Instruction Fuzzy Hash: C7218C75500604AFEB21DF69CC84F66FBE8EF08720F14886AEA859B262D771E405CB75
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 234 14aa6bb-14aa739 238 14aa73b-14aa74e GetFileType 234->238 239 14aa76e-14aa773 234->239 240 14aa750-14aa76d 238->240 241 14aa775-14aa77a 238->241 239->238 241->240
                          APIs
                          • GetFileType.KERNELBASE(?,00000E2C,2D9C2B8D,00000000,00000000,00000000,00000000), ref: 014AA741
                          Memory Dump Source
                          • Source File: 00000007.00000002.330922034.00000000014AA000.00000040.00000001.sdmp, Offset: 014AA000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_14aa000_unarchiver.jbxd
                          Similarity
                          • API ID: FileType
                          • String ID:
                          • API String ID: 3081899298-0
                          • Opcode ID: 77d8e98ecd58cffc8f447ca1fd1ffeebc228a70af0141f4c68c41dde3fe70117
                          • Instruction ID: e7ec521b5131e3b53928a11922d64a764629901debe818ad0f4dc2f89811f5d5
                          • Opcode Fuzzy Hash: 77d8e98ecd58cffc8f447ca1fd1ffeebc228a70af0141f4c68c41dde3fe70117
                          • Instruction Fuzzy Hash: 4221C3B54083846FE7128B25DC40FA6BFB8DF47720F1980DBE9849B253D264A909C771
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 245 14aa600-14aa60c 246 14aa60e-14aa625 245->246 247 14aa626-14aa66c 245->247 246->247 249 14aa66e-14aa676 FindCloseChangeNotification 247->249 250 14aa6ad-14aa6b2 247->250 251 14aa67c-14aa68e 249->251 250->249 253 14aa690-14aa6ac 251->253 254 14aa6b4-14aa6b9 251->254 254->253
                          APIs
                          • FindCloseChangeNotification.KERNELBASE(?), ref: 014AA674
                          Memory Dump Source
                          • Source File: 00000007.00000002.330922034.00000000014AA000.00000040.00000001.sdmp, Offset: 014AA000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_14aa000_unarchiver.jbxd
                          Similarity
                          • API ID: ChangeCloseFindNotification
                          • String ID:
                          • API String ID: 2591292051-0
                          • Opcode ID: ce1d974f7224f69d5ee5985431c393f0f7c6f61ea87bbe4dfb2e35a041195627
                          • Instruction ID: 0792c29435afcf50832e171ab37ff492c15aac014b747ee91d99a282d921c853
                          • Opcode Fuzzy Hash: ce1d974f7224f69d5ee5985431c393f0f7c6f61ea87bbe4dfb2e35a041195627
                          • Instruction Fuzzy Hash: 5721A1B54093C4AFD7138B25DC55652BFB4AF53220F1980DBDD858F263D2659908CB62
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 256 14aa448-14aa48e 258 14aa493-14aa499 256->258 259 14aa490 256->259 260 14aa49b 258->260 261 14aa49e-14aa4a7 258->261 259->258 260->261 262 14aa4e8-14aa4ed 261->262 263 14aa4a9-14aa4c9 CreateDirectoryW 261->263 262->263 266 14aa4cb-14aa4e7 263->266 267 14aa4ef-14aa4f4 263->267 267->266
                          APIs
                          • CreateDirectoryW.KERNELBASE(?,?), ref: 014AA4AF
                          Memory Dump Source
                          • Source File: 00000007.00000002.330922034.00000000014AA000.00000040.00000001.sdmp, Offset: 014AA000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_14aa000_unarchiver.jbxd
                          Similarity
                          • API ID: CreateDirectory
                          • String ID:
                          • API String ID: 4241100979-0
                          • Opcode ID: 2b1895c8977fd2b05b982327376bde3d1a3b7efd470dcae8901888b852d2fe8c
                          • Instruction ID: e4807bf64839bf6be4fe87309d745617743a6d97f914e7141c799675b4ed2235
                          • Opcode Fuzzy Hash: 2b1895c8977fd2b05b982327376bde3d1a3b7efd470dcae8901888b852d2fe8c
                          • Instruction Fuzzy Hash: BA117F715053849FD722CF29DC89B56BFE8EF46220F1984ABED49CB262D274E904CB61
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 269 14aa88e-14aa8e5 272 14aa929-14aa92e 269->272 273 14aa8e7-14aa8ef ReadFile 269->273 272->273 274 14aa8f5-14aa907 273->274 276 14aa909-14aa926 274->276 277 14aa930-14aa935 274->277 277->276
                          APIs
                          • ReadFile.KERNELBASE(?,00000E2C,2D9C2B8D,00000000,00000000,00000000,00000000), ref: 014AA8ED
                          Memory Dump Source
                          • Source File: 00000007.00000002.330922034.00000000014AA000.00000040.00000001.sdmp, Offset: 014AA000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_14aa000_unarchiver.jbxd
                          Similarity
                          • API ID: FileRead
                          • String ID:
                          • API String ID: 2738559852-0
                          • Opcode ID: bc6b90a456ac3af89c592626ebd2bd281dd59243a19773bf2c664f55aa56cbbb
                          • Instruction ID: 74f2321d9151a6bc4f92efa3d11e8b92d09a043c456864b6e6cfef9b1a47fdd6
                          • Opcode Fuzzy Hash: bc6b90a456ac3af89c592626ebd2bd281dd59243a19773bf2c664f55aa56cbbb
                          • Instruction Fuzzy Hash: A811BF71400204EFEB218F55DC80FA7FBA8EF59720F14886BEE499B261C275A409CB71
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • SetFilePointer.KERNELBASE(?,00000E2C,2D9C2B8D,00000000,00000000,00000000,00000000), ref: 014AA80A
                          Memory Dump Source
                          • Source File: 00000007.00000002.330922034.00000000014AA000.00000040.00000001.sdmp, Offset: 014AA000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_14aa000_unarchiver.jbxd
                          Similarity
                          • API ID: FilePointer
                          • String ID:
                          • API String ID: 973152223-0
                          • Opcode ID: cf59c6d27e142b91076ee618d4445664db23d7839e443971426d296bcbf4dc62
                          • Instruction ID: ed5e4a0e17c91a799d4f7f09408a7688c887d2ef087677e4c96df7eb16a23e9d
                          • Opcode Fuzzy Hash: cf59c6d27e142b91076ee618d4445664db23d7839e443971426d296bcbf4dc62
                          • Instruction Fuzzy Hash: F2118F71400204AFEB219F59DC84F66FBA8EF55720F14846BEE499B251D674A409CB71
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • CreateDirectoryW.KERNELBASE(?,?), ref: 014AA4AF
                          Memory Dump Source
                          • Source File: 00000007.00000002.330922034.00000000014AA000.00000040.00000001.sdmp, Offset: 014AA000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_14aa000_unarchiver.jbxd
                          Similarity
                          • API ID: CreateDirectory
                          • String ID:
                          • API String ID: 4241100979-0
                          • Opcode ID: 397629f9c0ff604d8f5cbdde41c76e8b01a709964194cc0a88b4dea520cfa5cb
                          • Instruction ID: 7b70b486f8851431d657b46d10d101ba916870275eea0541b8905b6f58ea63f1
                          • Opcode Fuzzy Hash: 397629f9c0ff604d8f5cbdde41c76e8b01a709964194cc0a88b4dea520cfa5cb
                          • Instruction Fuzzy Hash: 70115E756006049FEB20CF29D889766FBD8EF55620F58C4BBED09CB752E674E404CB61
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetFileType.KERNELBASE(?,00000E2C,2D9C2B8D,00000000,00000000,00000000,00000000), ref: 014AA741
                          Memory Dump Source
                          • Source File: 00000007.00000002.330922034.00000000014AA000.00000040.00000001.sdmp, Offset: 014AA000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_14aa000_unarchiver.jbxd
                          Similarity
                          • API ID: FileType
                          • String ID:
                          • API String ID: 3081899298-0
                          • Opcode ID: 6f19747a0e2926cfdbbd9e38af4ba10f87f374d0bdbb77f3665d2c47bc76086d
                          • Instruction ID: d37b839ab31264aed5312681843705340d5104047502a209f464c1bc1c6a6437
                          • Opcode Fuzzy Hash: 6f19747a0e2926cfdbbd9e38af4ba10f87f374d0bdbb77f3665d2c47bc76086d
                          • Instruction Fuzzy Hash: D6010475400204AEE7108B19CC84F67FFA8DF45720F648067EE059B251D274A405CA71
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000007.00000002.330922034.00000000014AA000.00000040.00000001.sdmp, Offset: 014AA000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_14aa000_unarchiver.jbxd
                          Similarity
                          • API ID: CloseFind
                          • String ID:
                          • API String ID: 1863332320-0
                          • Opcode ID: ec558d2b4892b0fcbce07f35da8575250283a02a1c2c2c83460a0b8765752bde
                          • Instruction ID: 9a0ca3757734ded0ebf18b8e0e1b0638713e09d6f6f70b172576b06f4ad0596d
                          • Opcode Fuzzy Hash: ec558d2b4892b0fcbce07f35da8575250283a02a1c2c2c83460a0b8765752bde
                          • Instruction Fuzzy Hash: CF1173755093849FD7128F29DC45A52FFF4EF46220F0984DBED858B263C275A848CB62
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetSystemInfo.KERNELBASE(?), ref: 014AB074
                          Memory Dump Source
                          • Source File: 00000007.00000002.330922034.00000000014AA000.00000040.00000001.sdmp, Offset: 014AA000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_14aa000_unarchiver.jbxd
                          Similarity
                          • API ID: InfoSystem
                          • String ID:
                          • API String ID: 31276548-0
                          • Opcode ID: 9e2f52ba26f8686c1cffa5d66c17f288e39c397b9ceb7c926db73a84cc93938d
                          • Instruction ID: bb32f7f41412a6c962bcb1de9debb25746ec105ce223419e03656e007e86e3fd
                          • Opcode Fuzzy Hash: 9e2f52ba26f8686c1cffa5d66c17f288e39c397b9ceb7c926db73a84cc93938d
                          • Instruction Fuzzy Hash: 0D117375409384AFD712CF25DC44B56FFA4DF46220F5884EBED849F253D275A908CB62
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • SetErrorMode.KERNELBASE(?), ref: 014AA290
                          Memory Dump Source
                          • Source File: 00000007.00000002.330922034.00000000014AA000.00000040.00000001.sdmp, Offset: 014AA000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_14aa000_unarchiver.jbxd
                          Similarity
                          • API ID: ErrorMode
                          • String ID:
                          • API String ID: 2340568224-0
                          • Opcode ID: 9fbce2203624af50dc1598620aee6c404e1328329d6ea3ddc76a76387a52c329
                          • Instruction ID: 0d09bf2f17bfa528932b2166d6946e8885543fe588b5690aba9c46536ba8cc6c
                          • Opcode Fuzzy Hash: 9fbce2203624af50dc1598620aee6c404e1328329d6ea3ddc76a76387a52c329
                          • Instruction Fuzzy Hash: D611A171409384AFD7228F15DC84B62FFB4DF56620F0880DBED848B263D275A808CB72
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • CreatePipe.KERNELBASE(?,00000E2C,?,?), ref: 014AAAA2
                          Memory Dump Source
                          • Source File: 00000007.00000002.330922034.00000000014AA000.00000040.00000001.sdmp, Offset: 014AA000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_14aa000_unarchiver.jbxd
                          Similarity
                          • API ID: CreatePipe
                          • String ID:
                          • API String ID: 2719314638-0
                          • Opcode ID: 090c7a0baeb2aabba848d26696330c404c5a0988648f4c826f3257e28e5fa081
                          • Instruction ID: 562ead0decdf33629184c7c6b26a67bdb5a7473a3b16bd6871e2012c827e4361
                          • Opcode Fuzzy Hash: 090c7a0baeb2aabba848d26696330c404c5a0988648f4c826f3257e28e5fa081
                          • Instruction Fuzzy Hash: 9D015E76500601ABD610DF16DC85B26FBA8EB88B20F14856AED089B641E231B915CBA5
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • FindNextFileW.KERNELBASE(?,00000E2C,?,?), ref: 014AA1C2
                          Memory Dump Source
                          • Source File: 00000007.00000002.330922034.00000000014AA000.00000040.00000001.sdmp, Offset: 014AA000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_14aa000_unarchiver.jbxd
                          Similarity
                          • API ID: FileFindNext
                          • String ID:
                          • API String ID: 2029273394-0
                          • Opcode ID: d49f414835b77edd383da8042555a66cd9b3893c8b808d3b02e44f898dcc8ac1
                          • Instruction ID: b6eb34fd99b10bf370598b9a4f9747661ee257e2a3a8e5cc041354871ec35bba
                          • Opcode Fuzzy Hash: d49f414835b77edd383da8042555a66cd9b3893c8b808d3b02e44f898dcc8ac1
                          • Instruction Fuzzy Hash: 26017175500601ABD710DF16DC85B36FBA8EBC8B20F14856AED089B741E335B915CBA5
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • FindCloseChangeNotification.KERNELBASE(?), ref: 014AA674
                          Memory Dump Source
                          • Source File: 00000007.00000002.330922034.00000000014AA000.00000040.00000001.sdmp, Offset: 014AA000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_14aa000_unarchiver.jbxd
                          Similarity
                          • API ID: ChangeCloseFindNotification
                          • String ID:
                          • API String ID: 2591292051-0
                          • Opcode ID: 654aed304f742a56dd71866b93fab7dca23ca4ba3f0b3eb882daaa506ed6f335
                          • Instruction ID: d1b07977246ffc60a1a314dd3662e3eedcb63cbea123030b7df3a3efdbda1ab6
                          • Opcode Fuzzy Hash: 654aed304f742a56dd71866b93fab7dca23ca4ba3f0b3eb882daaa506ed6f335
                          • Instruction Fuzzy Hash: 8B018F759002449FDB11CF29D884766FFA4EF94220F58C4ABDD498B366D6B5A808CF62
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000007.00000002.330922034.00000000014AA000.00000040.00000001.sdmp, Offset: 014AA000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_14aa000_unarchiver.jbxd
                          Similarity
                          • API ID: CloseFind
                          • String ID:
                          • API String ID: 1863332320-0
                          • Opcode ID: 7375854b9536df2c5e5d873cb7a936e814b237752378362c1c4620dd6bd936fc
                          • Instruction ID: 9acdfb281b442cd36051af4cc61752a4d9cb91131b7ec57421de54e8e6a0779b
                          • Opcode Fuzzy Hash: 7375854b9536df2c5e5d873cb7a936e814b237752378362c1c4620dd6bd936fc
                          • Instruction Fuzzy Hash: B501D1755006459FDB108F19D885767FF94DF08730F18C0ABDE098B362D2B5A448CB62
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • SetErrorMode.KERNELBASE(?), ref: 014AA290
                          Memory Dump Source
                          • Source File: 00000007.00000002.330922034.00000000014AA000.00000040.00000001.sdmp, Offset: 014AA000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_14aa000_unarchiver.jbxd
                          Similarity
                          • API ID: ErrorMode
                          • String ID:
                          • API String ID: 2340568224-0
                          • Opcode ID: 8b3a5b8450a14bb2f962cc66c8eafb0b7ac57ecd6d9be809cdeaaf96ebddb61a
                          • Instruction ID: c5dd68420bcc640a88c4c9a563eb52bc2b34ede37222413a11f6740b7158efea
                          • Opcode Fuzzy Hash: 8b3a5b8450a14bb2f962cc66c8eafb0b7ac57ecd6d9be809cdeaaf96ebddb61a
                          • Instruction Fuzzy Hash: 3FF0C835804644DFD710CF19D884762FF90DF19720F58C09BDD494B326D2B6A418CFA2
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000007.00000002.331173786.0000000002E20000.00000040.00000040.sdmp, Offset: 02E20000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_2e20000_unarchiver.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 007c449f21ded8359d977b6cd4d20986960e8863d7fd57e84ccc75eea96c80c1
                          • Instruction ID: 79930a02d09677247d62e4e78d5a5fa729ae390d656f4357ff51f1cacbac48ef
                          • Opcode Fuzzy Hash: 007c449f21ded8359d977b6cd4d20986960e8863d7fd57e84ccc75eea96c80c1
                          • Instruction Fuzzy Hash: 2E11A1E3C8A3804FD7464B2098990D57FB1DDA312431E45EBD486CF153E51E590FCBA6
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000007.00000002.331173786.0000000002E20000.00000040.00000040.sdmp, Offset: 02E20000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_2e20000_unarchiver.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 9c4429b2b8f49ecc0be39faa35a1c1ebdff0db3c6d292aac256fca32156608d1
                          • Instruction ID: 75b091212010e38e958bea3d180616a890e8a9db87800617c0cec61c713f2bfc
                          • Opcode Fuzzy Hash: 9c4429b2b8f49ecc0be39faa35a1c1ebdff0db3c6d292aac256fca32156608d1
                          • Instruction Fuzzy Hash: 7811496254E3C05FD3138B329C24851BFB49E8766071980DFE88ACF1A3D2296809CB63
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000007.00000002.332288736.0000000005360000.00000040.00000001.sdmp, Offset: 05360000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_5360000_unarchiver.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c672c98caed7a0775f43934b63e315b4dbe3315b4120d665161c36ffc4c2c223
                          • Instruction ID: a7b96a38476502a3035b32e1e93e8586e2117fd597792c040aace95bb68e2ff2
                          • Opcode Fuzzy Hash: c672c98caed7a0775f43934b63e315b4dbe3315b4120d665161c36ffc4c2c223
                          • Instruction Fuzzy Hash: 5A51E770E42218DFDB19DFB9D484AAEBBB2FF8A300F249469D405B7350DB399942CB54
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000007.00000002.332288736.0000000005360000.00000040.00000001.sdmp, Offset: 05360000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_5360000_unarchiver.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ec039c84bad65d89ab15eb492d118fe3e2d6fea3388b158a198041af2e7c16cb
                          • Instruction ID: 180f75fd3af4da97d2d2422b2e7e6adde16b6333b51deb45b93f69409ab71e9a
                          • Opcode Fuzzy Hash: ec039c84bad65d89ab15eb492d118fe3e2d6fea3388b158a198041af2e7c16cb
                          • Instruction Fuzzy Hash: 14211675D05208DFCB05DFA5D4446EEBBB6FB89304F10852AD905A3254DB746E46CF90
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000007.00000002.331173786.0000000002E20000.00000040.00000040.sdmp, Offset: 02E20000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_2e20000_unarchiver.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 858de5175f9082a140e74163b756ce5f4e7a0bea3dfb4a8b11a4119a2a941eee
                          • Instruction ID: 075c4da1b5d7b7c461bd6aa25acbce309b0c41643c8c7970f2aa4d5482ee3d34
                          • Opcode Fuzzy Hash: 858de5175f9082a140e74163b756ce5f4e7a0bea3dfb4a8b11a4119a2a941eee
                          • Instruction Fuzzy Hash: E801D2B24093546FD7018F14EC41C97BBBCDB86620B08C46FFD499B602D265AA08CBF2
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000007.00000002.331173786.0000000002E20000.00000040.00000040.sdmp, Offset: 02E20000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_2e20000_unarchiver.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 326cec6a01307fe2fc0889941c6c2536982eea56d9080354517da68bce184ff4
                          • Instruction ID: 15b3bc8093dba87688ed84249a5d2fe645201e2bdb1129f4d3997a89b6a12121
                          • Opcode Fuzzy Hash: 326cec6a01307fe2fc0889941c6c2536982eea56d9080354517da68bce184ff4
                          • Instruction Fuzzy Hash: 1401F5365083805FC7118F21EC41956BFA4EF46370F14C1EFE849CB252D225A409CB66
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000007.00000002.331173786.0000000002E20000.00000040.00000040.sdmp, Offset: 02E20000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_2e20000_unarchiver.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fe26f1269afe7258f5c5f10c262819919e67a8c9a21a65e076b1f4aba9c7bd3c
                          • Instruction ID: a688ce645dc2e1e840ccaa6633d842cf7c9efe8782bf07faa15fd3d96ce3ac5d
                          • Opcode Fuzzy Hash: fe26f1269afe7258f5c5f10c262819919e67a8c9a21a65e076b1f4aba9c7bd3c
                          • Instruction Fuzzy Hash: 6701D6B65083805FD7128F16EC40862FFA8DA8A630749C09FED898B612D625A904CBB2
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000007.00000002.332288736.0000000005360000.00000040.00000001.sdmp, Offset: 05360000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_5360000_unarchiver.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1cd5a7761d38a96d7e406ed0824eea8fb7d550cf49ff52ddcf0bacdd7edffbe3
                          • Instruction ID: b696b92eeb222c69990023b9aa48d23730843cea0ec8c589f150a7b7aaf818bb
                          • Opcode Fuzzy Hash: 1cd5a7761d38a96d7e406ed0824eea8fb7d550cf49ff52ddcf0bacdd7edffbe3
                          • Instruction Fuzzy Hash: 4E0113B0C062488FCB08DFB4D8597AEBBB1BF05305F1094AEC41167281C7788A84CF81
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000007.00000002.332288736.0000000005360000.00000040.00000001.sdmp, Offset: 05360000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_5360000_unarchiver.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d6075042f9c3b7c75ba6c0b15b04d9db78928959769cc026d0bb0327a0f05134
                          • Instruction ID: eac0cbf56a2de6e2b655758ffba4be18cdf691ad8b2bd0324854d4bece56e663
                          • Opcode Fuzzy Hash: d6075042f9c3b7c75ba6c0b15b04d9db78928959769cc026d0bb0327a0f05134
                          • Instruction Fuzzy Hash: AE010C74C022088FCB08EFA9C4497AEBBB1BB00301F2099AEC41163280C7789A84CF80
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000007.00000002.332288736.0000000005360000.00000040.00000001.sdmp, Offset: 05360000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_5360000_unarchiver.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 59e0390daa56ddfb8008aeab7ddff2b868286f2c61143f95ee83888250d4e11e
                          • Instruction ID: 6fa47680e505ac8e2e0d4de3926cb25bbe612da8cf3a502943fe65a363aa5408
                          • Opcode Fuzzy Hash: 59e0390daa56ddfb8008aeab7ddff2b868286f2c61143f95ee83888250d4e11e
                          • Instruction Fuzzy Hash: 360119B4D09209DBCB04DFA9C9496AEFBF1EF44300F2095AAC405A3354DB745A00CB91
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000007.00000002.331173786.0000000002E20000.00000040.00000040.sdmp, Offset: 02E20000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_2e20000_unarchiver.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5098aabdd1dc1e95d898857055399eb2f4199fa1cab8e4fc2848c2de8cc07258
                          • Instruction ID: cf56fca6cd8b0bdd7c447f4cf49deecc9a89e82bee811a084d4a7ee27b5461a7
                          • Opcode Fuzzy Hash: 5098aabdd1dc1e95d898857055399eb2f4199fa1cab8e4fc2848c2de8cc07258
                          • Instruction Fuzzy Hash: E4F082B28052046FD240DF15EC41CA6F7ECDFC4921B14C52FFC088B301E276A9144AF2
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000007.00000002.331173786.0000000002E20000.00000040.00000040.sdmp, Offset: 02E20000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_2e20000_unarchiver.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a5a5f6cff14aa9bcb12d3c23dc9d8b00e63fceea11019aff6454b15385f9fcea
                          • Instruction ID: 2da252d3bc6277356f83188f0afbfd56265a380dc756a0f0f67a72b45b6bd687
                          • Opcode Fuzzy Hash: a5a5f6cff14aa9bcb12d3c23dc9d8b00e63fceea11019aff6454b15385f9fcea
                          • Instruction Fuzzy Hash: BCF0E2716406409FC710CF1AE885555FFA0EB89770F18C0AFEC098B311D239A109CFA2
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000007.00000002.331173786.0000000002E20000.00000040.00000040.sdmp, Offset: 02E20000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_2e20000_unarchiver.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 585b91541108d0ee158baa9af9e03d6f0881d3839d069e4d15c29879c91d715e
                          • Instruction ID: a152e46f58cdd67a7aad5d99d8dac5feb88fe494fc1960bc21e48de0f0365441
                          • Opcode Fuzzy Hash: 585b91541108d0ee158baa9af9e03d6f0881d3839d069e4d15c29879c91d715e
                          • Instruction Fuzzy Hash: ABE092766006048BD650CF0BEC81862F7D8EB88630B18C07FDC0D8B711E135B504CEA6
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000007.00000002.330912897.00000000014A2000.00000040.00000001.sdmp, Offset: 014A2000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_14a2000_unarchiver.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a1331a61d7f08964582b287ff36f0b270a215d988ae42e4b8af3daa33dc6f674
                          • Instruction ID: 2f14424419e70d519b09ee59c6076f40f474a5a33a69cd5c3aa551e59d25a1e5
                          • Opcode Fuzzy Hash: a1331a61d7f08964582b287ff36f0b270a215d988ae42e4b8af3daa33dc6f674
                          • Instruction Fuzzy Hash: AFD05B752156914FD3168A1CC164F553FA4AB51B04F4744FEE8008B773C364D581E100
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000007.00000002.330912897.00000000014A2000.00000040.00000001.sdmp, Offset: 014A2000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_14a2000_unarchiver.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 141ad2d1bcac98dbed014390f0189a6e45a668e1cd09955941aba1dd86ed8052
                          • Instruction ID: dff44694de2c03a3cc6ff52564664cc81cd7eee730fc4cf2d94eda0df7207521
                          • Opcode Fuzzy Hash: 141ad2d1bcac98dbed014390f0189a6e45a668e1cd09955941aba1dd86ed8052
                          • Instruction Fuzzy Hash: D4D05E342002818BDB15DB1DC594F5A3BD4AB52B00F0644E9AD00CB772C3B8D881D600
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Non-executed Functions

                          Strings
                          Memory Dump Source
                          • Source File: 00000007.00000002.332288736.0000000005360000.00000040.00000001.sdmp, Offset: 05360000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_5360000_unarchiver.jbxd
                          Similarity
                          • API ID:
                          • String ID: u]-p^
                          • API String ID: 0-3566714672
                          • Opcode ID: e2c094114150236a911ef54b5c01c3bafd7dd97042eabe4aa45f2fda8afff91c
                          • Instruction ID: 657c9265c092ed6f3b38efff38652185feb52568e903ea9cb409248aebe29330
                          • Opcode Fuzzy Hash: e2c094114150236a911ef54b5c01c3bafd7dd97042eabe4aa45f2fda8afff91c
                          • Instruction Fuzzy Hash: 7191EC74E10244DFDB18CFA6E848A9DBBB3FB8D301F10C1A9D849A7254D7355996CF60
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Execution Graph

                          Execution Coverage:11.6%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:5.2%
                          Total number of Nodes:1372
                          Total number of Limit Nodes:59

                          Graph

                          execution_graph 16601 43817e 16602 438187 16601->16602 16603 438192 16601->16603 16605 4380f6 16602->16605 16607 43811f 16605->16607 16606 438164 16606->16603 16607->16606 16609 4300e8 2 API calls 16607->16609 16610 437e5e 16607->16610 16609->16607 16623 437d3c 16610->16623 16612 437ea9 16614 437eb3 16612->16614 16615 437efd 16612->16615 16627 41f432 16612->16627 16614->16607 16615->16614 16616 4165ff memcpy 16615->16616 16617 438054 16616->16617 16634 437371 16617->16634 16619 43806b 16620 438094 16619->16620 16647 42f50e 16619->16647 16620->16614 16622 4300e8 2 API calls 16620->16622 16622->16614 16624 437d69 16623->16624 16625 437d80 16623->16625 16624->16612 16625->16624 16626 438460 54 API calls 16625->16626 16626->16624 16628 41f466 16627->16628 16630 41f44f 16627->16630 16628->16615 16630->16628 16631 41f50b 16630->16631 16653 41f1a5 16630->16653 16666 41f3b1 16630->16666 16631->16628 16672 41c295 16631->16672 16644 437399 16634->16644 16635 438460 54 API calls 16635->16644 16636 4375bc 16639 43739d 16636->16639 16643 437612 memcpy 16636->16643 16637 42453e 2 API calls 16637->16636 16638 4251c4 54 API calls 16638->16644 16639->16619 16640 42453e 2 API calls 16640->16644 16641 43758f 16642 42453e 2 API calls 16641->16642 16645 437584 16642->16645 16643->16639 16644->16635 16644->16638 16644->16639 16644->16640 16644->16641 16644->16645 16646 437d3c 54 API calls 16644->16646 16645->16636 16645->16637 16646->16644 16648 42f52a 16647->16648 16649 4165ff memcpy 16648->16649 16652 42f561 16648->16652 16650 42f56f 16649->16650 16651 437371 55 API calls 16650->16651 16650->16652 16651->16652 16652->16620 16679 41bc3b 16653->16679 16655 41f1b4 16656 41edad 3 API calls 16655->16656 16663 41f27a 16655->16663 16657 41f1cb 16656->16657 16658 41f1f5 memcmp 16657->16658 16659 41f20e 16657->16659 16657->16663 16658->16659 16660 41f21b memcmp 16659->16660 16659->16663 16662 41f23d 16660->16662 16660->16663 16661 41f28e memcmp 16661->16663 16664 41f2a9 16661->16664 16662->16661 16662->16663 16663->16630 16664->16663 16665 41b1ca __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@ 16664->16665 16665->16663 16667 41f3ba 16666->16667 16668 41f41c 16666->16668 16669 41c295 3 API calls 16667->16669 16668->16630 16670 41f3c8 16669->16670 16670->16668 16671 41f3cc memcpy memset 16670->16671 16671->16668 16673 41c3d8 16672->16673 16678 41c2bf 16672->16678 16673->16628 16674 41be52 3 API calls 16674->16678 16676 41a18c 2 API calls 16677 41c3a9 16676->16677 16677->16673 16677->16676 16678->16673 16678->16674 16678->16677 16766 41a18c 16678->16766 16680 41bc54 16679->16680 16681 41bd61 16679->16681 16680->16681 16682 41bcfe 16680->16682 16689 4151e3 16680->16689 16681->16655 16682->16681 16683 41bdd8 memset 16682->16683 16684 41bdba 16682->16684 16685 41bde7 memcmp 16683->16685 16688 4175ed 6 API calls 16684->16688 16685->16681 16686 41bdcc 16686->16681 16686->16685 16688->16686 16692 41837f 16689->16692 16690 4151f9 16690->16682 16693 4183c1 16692->16693 16694 4183ca 16692->16694 16736 418197 16693->16736 16705 4183ee 16694->16705 16711 418160 16694->16711 16697 4183e5 16697->16705 16720 41739b 16697->16720 16700 418444 CreateFileW 16702 418477 16700->16702 16701 41845f CreateFileA 16701->16702 16703 4184c2 memset 16702->16703 16704 41847e GetLastError ??3@YAXPAX 16702->16704 16723 418758 16703->16723 16704->16705 16706 418497 16704->16706 16705->16690 16708 41837f 27 API calls 16706->16708 16708->16705 16712 41739b GetVersionExW 16711->16712 16713 418165 16712->16713 16747 4173e4 MultiByteToWideChar malloc 16713->16747 16717 41817f 16717->16697 16721 4173d6 16720->16721 16722 4173ad GetVersionExW 16720->16722 16721->16700 16721->16701 16722->16721 16724 418782 16723->16724 16725 418506 ??3@YAXPAX 16724->16725 16726 418160 11 API calls 16724->16726 16725->16705 16727 418799 16726->16727 16727->16725 16728 41739b GetVersionExW 16727->16728 16729 4187a7 16728->16729 16730 4187da 16729->16730 16734 4187ad GetDiskFreeSpaceW 16729->16734 16731 4187ec GetDiskFreeSpaceA 16730->16731 16735 4187e8 16730->16735 16733 418800 ??3@YAXPAX 16731->16733 16733->16725 16734->16733 16735->16731 16737 4181c5 16736->16737 16746 4181ab 16736->16746 16738 41739b GetVersionExW 16737->16738 16739 4181ca 16738->16739 16740 4181d3 GetTempPathW 16739->16740 16741 4181fb GetTempPathA 16739->16741 16755 417434 WideCharToMultiByte malloc 16740->16755 16759 4174f5 AreFileApisANSI MultiByteToWideChar malloc 16741->16759 16744 4181ed 16745 41822a ??3@YAXPAX 16744->16745 16744->16746 16745->16746 16746->16694 16748 417413 MultiByteToWideChar 16747->16748 16749 41742d 16747->16749 16748->16749 16750 417424 ??3@YAXPAX 16748->16750 16749->16717 16751 41748f AreFileApisANSI WideCharToMultiByte malloc 16749->16751 16750->16749 16752 4174ce WideCharToMultiByte 16751->16752 16753 4174ca ??3@YAXPAX 16751->16753 16752->16753 16754 4174e1 ??3@YAXPAX 16752->16754 16753->16697 16754->16753 16756 417465 16755->16756 16757 417469 WideCharToMultiByte 16755->16757 16756->16744 16757->16756 16758 41747e ??3@YAXPAX 16757->16758 16758->16756 16760 417531 MultiByteToWideChar 16759->16760 16761 417555 16759->16761 16762 417541 ??3@YAXPAX 16760->16762 16763 41754e 16760->16763 16761->16744 16762->16763 16763->16761 16764 417434 4 API calls 16763->16764 16765 41755f ??3@YAXPAX 16764->16765 16765->16761 16767 418c63 2 API calls 16766->16767 16768 41a1a7 16767->16768 16768->16678 15344 415308 ??3@YAXPAX 16925 43100e 16926 431048 16925->16926 16933 431029 16925->16933 16937 4304b2 16926->16937 16928 43105a 16929 4312d0 memset 16928->16929 16931 4310e7 16928->16931 16928->16933 16929->16931 16930 4172c8 memset 16930->16933 16932 4165ff memcpy 16931->16932 16931->16933 16936 431237 16931->16936 16934 4311d3 16932->16934 16935 4165ff memcpy 16934->16935 16935->16936 16936->16930 16936->16933 16938 4304cd 16937->16938 16940 43052d 16938->16940 16941 43817e 16938->16941 16940->16928 16942 438187 16941->16942 16943 438192 16941->16943 16944 4380f6 55 API calls 16942->16944 16943->16940 16944->16943 15345 44660a 15348 4465e4 15345->15348 15347 446613 15349 4465f3 __dllonexit 15348->15349 15350 4465ed _onexit 15348->15350 15349->15347 15350->15349 16463 44161d 16464 44177e 16463->16464 16467 441636 16463->16467 16465 441741 16465->16464 16471 4172c8 16465->16471 16467->16464 16467->16465 16475 4165ff 16467->16475 16469 4416dc 16470 4165ff memcpy 16469->16470 16470->16465 16473 4172d6 16471->16473 16472 417302 16472->16464 16473->16472 16478 41715f 16473->16478 16482 4165a0 16475->16482 16479 417174 16478->16479 16480 4171a8 memset 16479->16480 16481 41717d 16479->16481 16480->16481 16481->16472 16483 4165e7 16482->16483 16486 416520 16483->16486 16487 416527 16486->16487 16489 416574 16486->16489 16488 416561 memcpy 16487->16488 16487->16489 16488->16489 16489->16469 16594 441819 16597 430737 16594->16597 16596 441825 16599 430756 16597->16599 16600 43075f 16597->16600 16598 430819 memset 16598->16600 16599->16598 16599->16600 16600->16596 16770 40541f 16779 4055a4 16770->16779 16772 405438 memset memset memset memcpy memcpy 16774 4054bb 16772->16774 16785 40550f 16774->16785 16777 40550f 38 API calls 16778 405509 16777->16778 16780 4055c1 16779->16780 16781 4055aa 16779->16781 16780->16772 16782 405337 37 API calls 16781->16782 16783 4055b5 16782->16783 16783->16780 16784 4055b9 GetLastError 16783->16784 16784->16772 16786 4055a4 38 API calls 16785->16786 16787 405522 16786->16787 16798 405361 16787->16798 16790 4054ed 16790->16777 16791 405553 16793 4053b6 37 API calls 16791->16793 16794 40556b 16791->16794 16793->16794 16794->16790 16804 40538b 16794->16804 16799 405220 37 API calls 16798->16799 16800 405369 16799->16800 16800->16790 16800->16791 16801 4053b6 16800->16801 16802 405220 37 API calls 16801->16802 16803 4053bf 16802->16803 16803->16791 16805 405220 37 API calls 16804->16805 16806 405394 16805->16806 16807 4053df 16806->16807 16808 405220 37 API calls 16807->16808 16809 4053e8 16808->16809 16809->16790 16979 403021 16981 403150 16979->16981 16985 40303d 16979->16985 16980 40313a 16981->16980 16982 4031c2 wcschr 16981->16982 16988 4031f4 16981->16988 16984 4031d0 16982->16984 16983 40aa04 ??3@YAXPAX 16983->16985 16986 40aa04 ??3@YAXPAX 16984->16986 16985->16980 16985->16983 16986->16988 16989 40b1ab ??3@YAXPAX ??3@YAXPAX 16988->16989 16989->16980 15327 41ee26 15328 41ee41 15327->15328 15330 41ee32 15327->15330 15331 41edad 15328->15331 15334 41be52 15331->15334 15333 41edc1 15333->15330 15335 41be6f 15334->15335 15338 41be5f 15334->15338 15337 41be8c 15335->15337 15340 418c63 15335->15340 15337->15338 15339 41bf24 memset 15337->15339 15338->15333 15339->15338 15343 418c72 15340->15343 15341 418c94 15341->15337 15342 418d51 memset memset 15342->15341 15343->15341 15343->15342 16430 40d134 16431 40d13d 16430->16431 16433 40d142 16430->16433 16446 40d092 16431->16446 16434 40d1a1 16433->16434 16435 40d172 GetModuleHandleW 16433->16435 16442 40d28e 16433->16442 16437 40d1f8 16434->16437 16438 40d1ab wcscpy 16434->16438 16436 40d20b LoadStringW 16435->16436 16440 40d216 16436->16440 16449 40d29a 16437->16449 16441 40d1c6 16438->16441 16440->16442 16445 40d237 memcpy 16440->16445 16443 40d1cd wcslen 16441->16443 16444 40d1df GetModuleHandleW 16441->16444 16443->16440 16443->16444 16444->16436 16445->16442 16447 40d133 16446->16447 16448 40d09f ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 16446->16448 16447->16433 16448->16447 16450 40d2a3 GetModuleHandleW 16449->16450 16451 40d2aa 16449->16451 16450->16451 16451->16436 16490 441b3f 16493 43a9f6 16490->16493 16492 44189a 16494 43aa20 16493->16494 16498 43aad3 16493->16498 16495 43aa34 memset 16494->16495 16494->16498 16496 43aa4d 16495->16496 16513 43a6e7 16496->16513 16498->16492 16499 43aa6a 16499->16498 16500 43ac18 16499->16500 16501 43a9f6 2 API calls 16499->16501 16502 43ae3a memset 16500->16502 16512 43ad58 16500->16512 16501->16499 16503 43ae73 16502->16503 16521 42e1c0 16503->16521 16506 42e1c0 2 API calls 16507 43aea8 16506->16507 16508 43aec1 16507->16508 16525 42e199 16507->16525 16510 42e1c0 2 API calls 16508->16510 16508->16512 16510->16508 16512->16498 16528 4393a5 16512->16528 16514 43a6f5 16513->16514 16520 43a765 16513->16520 16514->16520 16532 42a115 16514->16532 16519 42a115 2 API calls 16519->16520 16520->16499 16522 42e1e3 16521->16522 16523 42e1c7 16521->16523 16522->16506 16523->16522 16524 42e199 2 API calls 16523->16524 16524->16523 16526 42a003 2 API calls 16525->16526 16527 42e1bc 16526->16527 16527->16508 16529 4394d0 16528->16529 16530 4393c7 16528->16530 16529->16498 16530->16529 16531 4165ff memcpy 16530->16531 16531->16530 16533 42a175 16532->16533 16534 42a122 16532->16534 16533->16520 16538 42b13b 16533->16538 16534->16533 16536 42a115 2 API calls 16534->16536 16541 43a174 16534->16541 16550 42a0a8 16534->16550 16536->16534 16539 42a115 2 API calls 16538->16539 16540 42b164 16539->16540 16540->16519 16540->16520 16545 43a19e 16541->16545 16547 43a196 16541->16547 16542 42a115 memcpy memset 16542->16545 16544 4165ff memcpy 16544->16545 16545->16542 16545->16544 16545->16547 16548 43a306 16545->16548 16566 439504 16545->16566 16570 4312d0 16545->16570 16547->16534 16548->16547 16549 4165ff memcpy 16548->16549 16549->16548 16578 42a078 16550->16578 16553 42a0b5 16553->16534 16555 42a0c2 16555->16553 16556 42a078 2 API calls 16555->16556 16557 42a0d1 16556->16557 16557->16553 16558 42a003 2 API calls 16557->16558 16559 42a0df 16558->16559 16559->16553 16560 42a078 2 API calls 16559->16560 16561 42a0ee 16560->16561 16561->16553 16562 42a003 2 API calls 16561->16562 16563 42a0fc 16562->16563 16563->16553 16564 42a003 2 API calls 16563->16564 16565 42a10b 16564->16565 16565->16534 16567 439529 16566->16567 16568 439536 16567->16568 16569 4165ff memcpy 16567->16569 16568->16545 16569->16567 16571 4312e6 16570->16571 16572 4312eb 16571->16572 16574 43024d 16571->16574 16572->16545 16575 43025c 16574->16575 16577 4302cd 16574->16577 16576 4172c8 memset 16575->16576 16575->16577 16576->16575 16577->16572 16579 42a09e 16578->16579 16581 42a07e 16578->16581 16579->16553 16582 42a003 16579->16582 16580 42a003 2 API calls 16580->16581 16581->16579 16581->16580 16583 42a00c 16582->16583 16585 42a010 16582->16585 16583->16555 16584 42a059 16584->16555 16585->16584 16586 42a003 2 API calls 16585->16586 16587 42a033 16586->16587 16587->16584 16588 42a003 2 API calls 16587->16588 16589 42a042 16588->16589 16589->16584 16590 42a050 16589->16590 16591 42a05c 16589->16591 16592 42a115 2 API calls 16590->16592 16593 42a078 2 API calls 16591->16593 16592->16584 16593->16584 16769 41493c EnumResourceNamesW 15311 4287c1 15314 425711 15311->15314 15313 425ad6 15314->15313 15315 424251 15314->15315 15317 424261 15315->15317 15318 424334 15317->15318 15319 4300e8 15317->15319 15318->15313 15322 4300fa 15319->15322 15320 430196 memset 15321 4301de 15320->15321 15323 4301bc 15320->15323 15321->15318 15322->15320 15322->15321 15323->15321 15324 4301c9 memcpy 15323->15324 15324->15321 15325 4152c7 malloc 15326 4152e2 15325->15326 17036 4104ca 17037 4104d2 17036->17037 17038 4104d9 17036->17038 17041 40d134 17037->17041 17042 40d13d 17041->17042 17044 40d142 17041->17044 17043 40d092 4 API calls 17042->17043 17043->17044 17045 40d1a1 17044->17045 17046 40d172 GetModuleHandleW 17044->17046 17053 40d28e 17044->17053 17048 40d1f8 17045->17048 17049 40d1ab wcscpy 17045->17049 17047 40d20b LoadStringW 17046->17047 17051 40d216 17047->17051 17050 40d29a GetModuleHandleW 17048->17050 17052 40d1c6 17049->17052 17050->17047 17051->17053 17056 40d237 memcpy 17051->17056 17054 40d1cd wcslen 17052->17054 17055 40d1df GetModuleHandleW 17052->17055 17054->17051 17054->17055 17055->17047 17056->17053 17918 4095d9 memset 17919 40b2cc 27 API calls 17918->17919 17920 409615 17919->17920 17931 409b98 GetFileAttributesW 17920->17931 17922 409634 17923 409648 17922->17923 17932 4091b8 memset 17922->17932 17924 40b2cc 27 API calls 17923->17924 17927 40964c 17923->17927 17926 40965d 17924->17926 17962 409b98 GetFileAttributesW 17926->17962 17929 40967c 17929->17927 17963 409529 17929->17963 17931->17922 17933 409202 17932->17933 17934 444432 9 API calls 17933->17934 17935 409215 17934->17935 17936 40b273 27 API calls 17935->17936 17947 4093df 17935->17947 17937 409236 17936->17937 17938 438552 54 API calls 17937->17938 17939 409240 17938->17939 17940 40937b 17939->17940 17942 4251c4 54 API calls 17939->17942 17941 40b273 27 API calls 17940->17941 17943 409399 17941->17943 17948 409254 17942->17948 17944 438552 54 API calls 17943->17944 17945 4093a3 17944->17945 17946 4251c4 54 API calls 17945->17946 17945->17947 17955 4093e4 17945->17955 17946->17945 17947->17923 17948->17940 17949 4092be memcpy memcmp 17948->17949 17950 409333 memcmp 17949->17950 17951 4092e5 17949->17951 17950->17940 17953 409347 memcpy 17950->17953 17951->17940 17952 4092f2 memcpy memcpy 17951->17952 17954 409363 memcpy 17952->17954 17953->17954 17954->17940 17955->17947 17956 409409 memcmp 17955->17956 17956->17947 17957 409421 memcmp 17956->17957 17958 4094a4 memcmp 17957->17958 17959 409435 17957->17959 17958->17947 17960 4094b8 memcpy memcpy 17958->17960 17959->17947 17961 409442 memcpy memcpy memcpy 17959->17961 17960->17947 17961->17947 17962->17929 17976 4096c3 CreateFileW 17963->17976 17965 409543 17966 409550 GetFileSize 17965->17966 17974 4095cd 17965->17974 17967 409577 CloseHandle 17966->17967 17968 40955f 17966->17968 17967->17974 17975 409585 17967->17975 17969 40afcf 2 API calls 17968->17969 17970 409569 17969->17970 17977 40a2ef ReadFile 17970->17977 17972 409574 17972->17967 17974->17927 17975->17974 17978 40908b 17975->17978 17976->17965 17977->17972 17979 4090a0 memset 17978->17979 17982 40910c 17978->17982 17980 408d96 17979->17980 17981 4090d6 memcmp 17980->17981 17981->17982 17983 4090ed memcpy 17981->17983 17982->17974 17983->17982 15351 4466f4 15352 446904 15351->15352 15353 446700 GetModuleHandleA 15352->15353 15356 446710 __set_app_type __p__fmode __p__commode 15353->15356 15355 4467a4 15357 4467ac __setusermatherr 15355->15357 15358 4467b8 15355->15358 15356->15355 15357->15358 15359 4467bd _initterm __wgetmainargs _initterm 15358->15359 15360 44681e GetStartupInfoW 15359->15360 15361 446810 15359->15361 15363 446866 GetModuleHandleA 15360->15363 15369 41276d 15363->15369 15367 446896 exit 15368 44689d _cexit 15367->15368 15368->15361 15370 41277d 15369->15370 15398 4044a4 LoadLibraryW 15370->15398 15372 412785 15373 412789 15372->15373 15374 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 15372->15374 15373->15367 15373->15368 15375 4127c8 15374->15375 15407 412465 memset ??2@YAPAXI 15375->15407 15377 412813 15427 40b1ab ??3@YAXPAX ??3@YAXPAX 15377->15427 15378 4127ea 15378->15377 15380 412863 CoInitialize 15378->15380 15415 41268e 15378->15415 15424 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW 15380->15424 15381 41296f 15428 40b633 15381->15428 15385 41285b 15385->15377 15385->15380 15386 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 15390 412957 15386->15390 15395 4128ca 15386->15395 15390->15377 15391 4128d0 TranslateAcceleratorW 15392 412941 GetMessageW 15391->15392 15391->15395 15392->15390 15392->15391 15393 412909 IsDialogMessageW 15393->15392 15393->15395 15394 4128fd IsDialogMessageW 15394->15392 15394->15393 15395->15391 15395->15393 15395->15394 15396 41292b TranslateMessage DispatchMessageW 15395->15396 15397 41291f IsDialogMessageW 15395->15397 15396->15392 15397->15392 15397->15396 15399 4044f7 7078DB20 15398->15399 15400 4044cf GetProcAddress 15398->15400 15403 404500 15399->15403 15401 4044e8 FreeLibrary 15400->15401 15402 4044df 15400->15402 15401->15399 15404 4044f3 15401->15404 15402->15401 15405 404507 MessageBoxW 15403->15405 15406 40451e 15403->15406 15404->15403 15405->15372 15406->15372 15408 4124e0 15407->15408 15409 412505 ??2@YAPAXI 15408->15409 15410 41251c 15409->15410 15432 4010f9 15410->15432 15413 40a7be 15414 41259b wcscpy 15413->15414 15414->15378 15418 4126a8 15415->15418 15416 412758 15416->15385 15417 4126d3 _wcsicmp 15417->15418 15418->15416 15418->15417 15420 41270a 15418->15420 15445 4125f8 _wcsicmp 15418->15445 15420->15416 15436 4110dc 15420->15436 15422 412726 15423 4104fb CreateFileW WriteFile GetStdHandle FindCloseChangeNotification 15422->15423 15423->15416 15425 40a7be 15424->15425 15426 412453 CreateWindowExW 15425->15426 15426->15386 15427->15381 15429 40b640 15428->15429 15430 40b639 ??3@YAXPAX 15428->15430 15431 40b1ab ??3@YAXPAX ??3@YAXPAX 15429->15431 15430->15429 15431->15373 15433 401130 15432->15433 15434 401134 GetModuleHandleW LoadIconW 15433->15434 15435 401107 wcsncat 15433->15435 15434->15413 15435->15433 15437 41113e 15436->15437 15439 4110f0 15436->15439 15458 444a54 15437->15458 15461 4032b4 15437->15461 15438 4110f7 _wcsicmp 15438->15439 15439->15437 15439->15438 15440 4111af 15441 411157 15441->15440 15442 4111a6 qsort 15441->15442 15442->15440 15446 412609 15445->15446 15447 41260d _wcsicmp 15445->15447 15446->15418 15448 412622 _wcsicmp 15447->15448 15449 41261e 15447->15449 15450 412633 15448->15450 15451 412637 _wcsicmp 15448->15451 15449->15418 15450->15418 15452 412648 15451->15452 15453 41264c _wcsicmp 15451->15453 15452->15418 15454 412661 _wcsicmp 15453->15454 15455 41265d 15453->15455 15456 412672 15454->15456 15457 412676 _wcsicmp 15454->15457 15455->15418 15456->15418 15457->15418 15459 444a64 FreeLibrary 15458->15459 15460 444a83 15458->15460 15459->15460 15460->15441 15462 4032c4 15461->15462 15463 40b633 ??3@YAXPAX 15462->15463 15464 403316 15463->15464 15476 44553b 15464->15476 15468 403480 15469 40b633 ??3@YAXPAX 15468->15469 15471 403495 15469->15471 15470 40333c 15470->15468 15472 4033a9 memset memcpy 15470->15472 15473 4033ec wcscmp 15470->15473 15474 403421 _wcsicmp 15470->15474 15621 40f508 15470->15621 15471->15441 15472->15470 15472->15473 15473->15470 15474->15470 15477 445548 15476->15477 15478 445599 15477->15478 15631 40c768 15477->15631 15479 4455a8 memset 15478->15479 15487 4457f2 15478->15487 15697 403988 15479->15697 15486 4458aa 15489 44594a 15486->15489 15490 4458bb memset memset 15486->15490 15497 445854 15487->15497 15735 403e2d memset memset memset memset memset 15487->15735 15488 445672 15708 403fbe memset memset memset memset memset 15488->15708 15493 4459ed 15489->15493 15494 44595e memset memset 15489->15494 15496 414c2e 6 API calls 15490->15496 15499 445a00 memset memset 15493->15499 15500 445b22 15493->15500 15501 414c2e 6 API calls 15494->15501 15495 4455e5 15495->15488 15533 44560f 15495->15533 15502 4458f9 15496->15502 15497->15486 15746 403c9c memset memset memset memset memset 15497->15746 15508 414c2e 6 API calls 15499->15508 15504 445bca 15500->15504 15505 445b38 memset memset memset 15500->15505 15509 44599c 15501->15509 15503 40b2cc 27 API calls 15502->15503 15510 445909 15503->15510 15511 445c8b memset memset 15504->15511 15550 445cf0 15504->15550 15513 445bd4 15505->15513 15514 445b98 15505->15514 15515 445a3e 15508->15515 15517 40b2cc 27 API calls 15509->15517 15796 409b98 GetFileAttributesW 15510->15796 15518 414c2e 6 API calls 15511->15518 15512 44557a 15688 444b06 15512->15688 15757 414c2e 15513->15757 15514->15513 15519 445ba2 15514->15519 15521 40b2cc 27 API calls 15515->15521 15525 4459ac 15517->15525 15526 445cc9 15518->15526 15848 445403 memset 15519->15848 15528 445a4f 15521->15528 15523 403335 15614 4452e5 15523->15614 15524 445823 15794 40b1ab ??3@YAXPAX ??3@YAXPAX 15524->15794 15838 409b98 GetFileAttributesW 15525->15838 15861 409b98 GetFileAttributesW 15526->15861 15527 445879 15795 40b1ab ??3@YAXPAX ??3@YAXPAX 15527->15795 15547 40b2cc 27 API calls 15528->15547 15531 445d3d 15548 40b2cc 27 API calls 15531->15548 15532 445d88 memset memset memset 15537 414c2e 6 API calls 15532->15537 15778 4454bf 15533->15778 15534 445680 15785 40b1ab ??3@YAXPAX ??3@YAXPAX 15534->15785 15543 445dde 15537->15543 15540 445bf3 15771 445389 15540->15771 15541 445928 15541->15489 15797 40b6ef 15541->15797 15549 40b2cc 27 API calls 15543->15549 15544 4459cb 15544->15493 15556 40b6ef 125 API calls 15544->15556 15594 445a94 15547->15594 15553 445d54 _wcsicmp 15548->15553 15555 445def 15549->15555 15550->15523 15550->15531 15550->15532 15551 445389 129 API calls 15551->15504 15552 44566d 15552->15487 15719 413d4c 15552->15719 15559 445d71 15553->15559 15601 445d67 15553->15601 15872 409b98 GetFileAttributesW 15555->15872 15556->15493 15862 445093 15559->15862 15561 4456d8 15566 40b2cc 27 API calls 15561->15566 15564 44563c 15784 40b1ab ??3@YAXPAX ??3@YAXPAX 15564->15784 15565 40b6ef 125 API calls 15565->15523 15571 4456e2 15566->15571 15567 40b2cc 27 API calls 15572 445c23 15567->15572 15570 445e12 15574 445e6b 15570->15574 15576 40b2cc 27 API calls 15570->15576 15578 4456fd memset memset memset memset 15571->15578 15579 4457c7 15571->15579 15580 445389 129 API calls 15572->15580 15577 445093 7 API calls 15574->15577 15575 445b17 15845 40aebe 15575->15845 15582 445e33 15576->15582 15584 445e7e 15577->15584 15600 44576f 15578->15600 15787 413d29 15579->15787 15585 445c47 15580->15585 15873 409b98 GetFileAttributesW 15582->15873 15586 445f67 15584->15586 15588 40b2cc 27 API calls 15585->15588 15589 40b2cc 27 API calls 15586->15589 15587 445ab2 memset 15590 40b2cc 27 API calls 15587->15590 15591 445c53 15588->15591 15593 445f73 15589->15593 15590->15594 15596 445389 129 API calls 15591->15596 15875 409b98 GetFileAttributesW 15593->15875 15594->15575 15594->15587 15599 445389 129 API calls 15594->15599 15839 40ae51 15594->15839 15595 445e56 15595->15574 15597 445e83 memset 15595->15597 15596->15504 15602 40b2cc 27 API calls 15597->15602 15599->15594 15600->15579 15603 40b2cc 27 API calls 15600->15603 15601->15523 15601->15565 15610 445eab 15602->15610 15604 4457a8 15603->15604 15786 409b98 GetFileAttributesW 15604->15786 15606 40ae51 3 API calls 15606->15610 15607 445f5c 15608 40aebe FindClose 15607->15608 15608->15586 15609 40b2cc 27 API calls 15609->15610 15610->15606 15610->15607 15610->15609 15612 445f3a 15610->15612 15874 409b98 GetFileAttributesW 15610->15874 15613 445093 7 API calls 15612->15613 15613->15610 15615 444a54 FreeLibrary 15614->15615 15616 4452fb 15615->15616 16403 445367 15616->16403 15619 40b04b ??3@YAXPAX 15620 445319 15619->15620 15620->15470 15622 40f53b 15621->15622 15623 40f518 15621->15623 15624 40f583 15622->15624 15625 40f55f ??3@YAXPAX 15622->15625 15623->15622 15627 40f568 memcpy 15623->15627 15626 4099f4 3 API calls 15624->15626 15628 40f595 15625->15628 15626->15628 15629 40f5b8 15627->15629 15630 40f59f memcpy 15628->15630 15629->15470 15630->15629 15632 40c775 15631->15632 15876 40b1ab ??3@YAXPAX ??3@YAXPAX 15632->15876 15634 40c788 15877 40b1ab ??3@YAXPAX ??3@YAXPAX 15634->15877 15636 40c790 15878 40b1ab ??3@YAXPAX ??3@YAXPAX 15636->15878 15638 40c798 15879 40aa04 15638->15879 15642 40c7a7 15903 40c3c3 15642->15903 15646 40c877 15652 40bdb0 15646->15652 15647 40c86c 15923 4053fe 15647->15923 15649 40c813 _wcslwr 15651 40c7e5 15649->15651 15650 40c829 wcslen 15650->15651 15651->15646 15651->15647 15651->15649 15651->15650 16117 404363 15652->16117 15655 40bf5d 16137 40440c 15655->16137 15657 40bdee 15657->15655 15660 40b2cc 27 API calls 15657->15660 15658 40bddf CredEnumerateW 15658->15657 15661 40be02 wcslen 15660->15661 15661->15655 15669 40be1e 15661->15669 15662 40be26 _wcsncoll 15662->15669 15664 40be7d memset 15665 40bea7 memcpy 15664->15665 15664->15669 15666 40bf11 wcschr 15665->15666 15665->15669 15666->15669 15667 40b2cc 27 API calls 15668 40bef6 _wcsnicmp 15667->15668 15668->15666 15668->15669 15669->15655 15669->15662 15669->15664 15669->15665 15669->15666 15669->15667 15670 40bf43 LocalFree 15669->15670 16140 404423 15669->16140 15670->15669 15671 4135f7 16155 4135e0 15671->16155 15674 40b2cc 27 API calls 15675 41360d 15674->15675 15676 40a804 6 API calls 15675->15676 15677 413613 15676->15677 15678 41361b 15677->15678 15679 41363e 15677->15679 15680 40b273 27 API calls 15678->15680 15681 4135e0 FreeLibrary 15679->15681 15682 413625 GetProcAddress 15680->15682 15683 413643 15681->15683 15682->15679 15684 413648 15682->15684 15683->15512 15685 413658 15684->15685 15686 4135e0 FreeLibrary 15684->15686 15685->15512 15687 413666 15686->15687 15687->15512 16158 4449b9 15688->16158 15691 4449b9 40 API calls 15692 444b4b 15691->15692 15695 444b99 memcmp 15692->15695 15696 444c0b 15692->15696 15693 4449b9 40 API calls 15694 444c1f 15693->15694 15694->15478 15695->15692 15696->15693 15698 40399d 15697->15698 16179 403a16 15698->16179 15701 4039b4 15707 4039f4 15701->15707 16189 40a02c CreateFileW 15701->16189 15702 403a0a 16188 40b1ab ??3@YAXPAX ??3@YAXPAX 15702->16188 15704 403a12 wcsrchr 15704->15495 15707->15702 15709 414c2e 6 API calls 15708->15709 15710 404048 15709->15710 15711 414c2e 6 API calls 15710->15711 15712 404056 15711->15712 16201 40414f memset 15712->16201 15714 404140 16212 40b1ab ??3@YAXPAX ??3@YAXPAX 15714->16212 15716 4040ec memset 15718 4040e0 15716->15718 15717 404148 15717->15534 15718->15714 15718->15716 15720 40b633 ??3@YAXPAX 15719->15720 15721 413d65 CreateToolhelp32Snapshot memset Process32FirstW 15720->15721 15722 413f00 Process32NextW 15721->15722 15723 413da5 OpenProcess 15722->15723 15724 413f17 CloseHandle 15722->15724 15725 413df3 memset 15723->15725 15728 413eb0 15723->15728 15724->15561 16225 413f27 15725->16225 15727 413ebf ??3@YAXPAX 15727->15728 15728->15722 15728->15727 16236 4099f4 15728->16236 15730 413e37 GetModuleHandleW 15731 413e46 GetProcAddress 15730->15731 15732 413e1f 15730->15732 15731->15732 15732->15730 16230 413ca4 15732->16230 15734 413ea2 CloseHandle 15734->15728 15736 414c2e 6 API calls 15735->15736 15737 403eb7 15736->15737 15738 414c2e 6 API calls 15737->15738 15739 403ec5 15738->15739 15740 40414f 18 API calls 15739->15740 15741 403f4f 15740->15741 15742 403faf 15741->15742 15743 403f5b memset 15741->15743 16249 40b1ab ??3@YAXPAX ??3@YAXPAX 15742->16249 15743->15741 15745 403fb7 15745->15524 15747 414c2e 6 API calls 15746->15747 15748 403d26 15747->15748 15749 414c2e 6 API calls 15748->15749 15750 403d34 15749->15750 15751 40414f 18 API calls 15750->15751 15756 403dbe 15751->15756 15752 403e1e 16250 40b1ab ??3@YAXPAX ??3@YAXPAX 15752->16250 15753 403dca memset 15753->15756 15755 403e26 15755->15527 15756->15752 15756->15753 15762 414c40 15757->15762 15758 414c73 memset 15759 414c94 15758->15759 16251 414592 RegOpenKeyExW 15759->16251 15761 414c64 SHGetSpecialFolderPathW 15763 414d0b 15761->15763 15762->15758 15762->15761 15768 40b2cc 15763->15768 15764 414cf4 wcscpy 15764->15763 15765 414cc1 15765->15764 16252 4145ac RegQueryValueExW 15765->16252 15769 40b58d 27 API calls 15768->15769 15770 40b2d1 15769->15770 15770->15540 15776 4453c4 15771->15776 15772 40ae51 3 API calls 15772->15776 15773 4453f3 15774 40aebe FindClose 15773->15774 15775 4453fe 15774->15775 15775->15567 15776->15772 15776->15773 15777 445403 126 API calls 15776->15777 15777->15776 15783 4454f9 15778->15783 15779 40ae51 3 API calls 15779->15783 15780 44552a 15781 40aebe FindClose 15780->15781 15782 445536 15781->15782 15782->15564 15783->15779 15783->15780 15784->15552 15785->15552 15786->15579 15788 413d39 15787->15788 15789 413d2f FreeLibrary 15787->15789 15790 40b633 ??3@YAXPAX 15788->15790 15789->15788 15791 413d42 15790->15791 15792 40b633 ??3@YAXPAX 15791->15792 15793 413d4a 15792->15793 15793->15487 15794->15497 15795->15486 15796->15541 15798 44db70 15797->15798 15799 40b6fc memset 15798->15799 15800 409c70 15799->15800 15801 40b732 wcsrchr 15800->15801 15802 40b743 15801->15802 15803 40b746 memset 15801->15803 15802->15803 15804 40b2cc 27 API calls 15803->15804 15805 40b76f 15804->15805 16254 409b98 GetFileAttributesW 15805->16254 15807 40b7b2 16255 40bb98 15807->16255 15809 40b792 15809->15807 15811 40b2cc 27 API calls 15809->15811 15810 40b7d4 memset CreateFileW 15812 40b837 FindCloseChangeNotification 15810->15812 15813 40b817 15810->15813 15811->15807 15814 40b83e memset 15812->15814 15815 40b827 CopyFileW 15813->15815 15816 40b866 15814->15816 15815->15814 16278 444432 15816->16278 15818 40b879 15819 40b273 27 API calls 15818->15819 15828 40bac6 15818->15828 15822 40b89a 15819->15822 15820 40baeb 15823 40b04b ??3@YAXPAX 15820->15823 15821 40bade DeleteFileW 15821->15820 16284 438552 15822->16284 15825 40baf3 15823->15825 15825->15489 15828->15820 15828->15821 15829 40b8bd memset 15836 40b8b8 15829->15836 15830 40b9b5 memcmp 15830->15836 15831 404423 36 API calls 15831->15836 15833 40bb3e memset memcpy 15833->15836 15834 4251c4 54 API calls 15834->15836 15835 40bb88 LocalFree 15835->15836 15836->15828 15836->15829 15836->15830 15836->15831 15836->15833 15836->15834 15836->15835 15837 40ba5f memcmp 15836->15837 16291 447280 memset 15836->16291 15837->15836 15838->15544 15840 40ae7b FindNextFileW 15839->15840 15841 40ae5c FindFirstFileW 15839->15841 15842 40ae8f 15840->15842 15844 40ae94 15840->15844 15841->15844 15843 40aebe FindClose 15842->15843 15843->15844 15844->15594 15846 40aed1 15845->15846 15847 40aec7 FindClose 15845->15847 15846->15500 15847->15846 15849 40b2cc 27 API calls 15848->15849 15850 44543f 15849->15850 16399 409b98 GetFileAttributesW 15850->16399 15852 44545e 15853 445476 15852->15853 15855 40b6ef 125 API calls 15852->15855 15854 40b2cc 27 API calls 15853->15854 15856 445482 15854->15856 15855->15853 16400 409b98 GetFileAttributesW 15856->16400 15858 4454a1 15859 4454b9 15858->15859 15860 40b6ef 125 API calls 15858->15860 15859->15551 15860->15859 15861->15550 16401 4096c3 CreateFileW 15862->16401 15864 44509f 15865 4450a7 GetFileSize 15864->15865 15866 4450fd 15864->15866 15867 4450f6 CloseHandle 15865->15867 15868 4450ba ??2@YAPAXI memset 15865->15868 15866->15523 15867->15866 16402 40a2ef ReadFile 15868->16402 15870 4450dd 15871 4450ef ??3@YAXPAX 15870->15871 15871->15867 15872->15570 15873->15595 15874->15610 15875->15601 15876->15634 15877->15636 15878->15638 15880 40aa14 15879->15880 15881 40aa0a ??3@YAXPAX 15879->15881 15882 40c274 memset 15880->15882 15881->15880 15883 414c2e 6 API calls 15882->15883 15884 40c2ae 15883->15884 15926 40c1d3 15884->15926 15889 40c3be 15889->15642 15891 40c2fd FindFirstUrlCacheEntryW 15892 40c3b6 15891->15892 15893 40c31e wcschr 15891->15893 15948 40b04b 15892->15948 15895 40c35e FindNextUrlCacheEntryW 15893->15895 15901 40c331 15893->15901 15895->15893 15896 40c373 GetLastError 15895->15896 15897 40c3ad FindCloseUrlCache 15896->15897 15898 40c37e 15896->15898 15897->15892 15900 40afcf 2 API calls 15898->15900 15899 40c33e wcschr 15899->15895 15899->15901 15902 40c391 FindNextUrlCacheEntryW 15900->15902 15901->15895 15901->15899 15902->15893 15902->15897 16038 40b1ab ??3@YAXPAX ??3@YAXPAX 15903->16038 15905 40c3dd 15906 40b2cc 27 API calls 15905->15906 15907 40c3e7 15906->15907 16039 414592 RegOpenKeyExW 15907->16039 15909 40c3f4 15910 40c50e 15909->15910 15911 40c3ff 15909->15911 15920 405337 15910->15920 15912 40c418 memset 15911->15912 15913 40aa1d 15912->15913 15914 40c44c RegEnumValueW 15913->15914 15915 40c471 15914->15915 15916 40c505 RegCloseKey 15914->15916 15917 40c47a _wcsupr 15915->15917 15918 40c4ac memset 15915->15918 15919 40c4e4 RegEnumValueW 15915->15919 15916->15910 15917->15915 15918->15915 15919->15916 15919->15917 16040 405220 15920->16040 15924 405220 37 API calls 15923->15924 15925 405407 15924->15925 15925->15646 15927 40c210 15926->15927 15928 40ae51 3 API calls 15927->15928 15929 40c264 15927->15929 15932 40c231 _wcsicmp 15927->15932 15933 40c1d3 13 API calls 15927->15933 15928->15927 15930 40aebe FindClose 15929->15930 15931 40c26f 15930->15931 15936 40e5ed memset memset 15931->15936 15932->15927 15934 40c248 15932->15934 15933->15927 15951 40c084 15934->15951 15937 414c2e 6 API calls 15936->15937 15938 40e63f 15937->15938 15969 409b98 GetFileAttributesW 15938->15969 15940 40e667 15970 409b98 GetFileAttributesW 15940->15970 15942 40e68f 15943 40c2d8 15942->15943 15971 40e4b2 15942->15971 15943->15889 15945 40afcf 15943->15945 15946 40b04b ??3@YAXPAX 15945->15946 15947 40afd7 ??2@YAPAXI 15946->15947 15947->15891 15949 40b051 ??3@YAXPAX 15948->15949 15950 40b05f 15948->15950 15949->15950 15950->15889 15952 44db70 15951->15952 15953 40c091 CreateFileW 15952->15953 15954 40c0b5 15953->15954 15955 40c1cd 15953->15955 15966 40a32d SetFilePointer 15954->15966 15955->15927 15958 40c0d2 GetFileSize 15959 40c1c6 CloseHandle 15958->15959 15964 40c0ee 15958->15964 15959->15955 15960 40c10e memcpy 15961 40c133 strchr 15960->15961 15960->15964 15963 40c14d strchr 15961->15963 15961->15964 15962 40c1c5 15962->15959 15963->15964 15965 40c15e _strlwr memset 15963->15965 15964->15960 15964->15961 15964->15962 15964->15965 15965->15964 15967 40a2ef ReadFile 15966->15967 15968 40a34e 15967->15968 15968->15958 15968->15959 15969->15940 15970->15942 15992 40e01e 15971->15992 15973 40e593 15974 40e5b0 15973->15974 15975 40e59c DeleteFileW 15973->15975 15976 40b04b ??3@YAXPAX 15974->15976 15975->15974 15978 40e5bb 15976->15978 15977 40e521 15977->15973 16014 40e175 15977->16014 15980 40e5c4 CloseHandle 15978->15980 15981 40e5cc 15978->15981 15980->15981 15984 40b633 ??3@YAXPAX 15981->15984 15982 40e540 15983 40e573 15982->15983 16024 40e2ab 15982->16024 15986 40e584 15983->15986 15987 40e57c CloseHandle 15983->15987 15985 40e5db 15984->15985 15988 40b633 ??3@YAXPAX 15985->15988 16037 40b1ab ??3@YAXPAX ??3@YAXPAX 15986->16037 15987->15986 15990 40e5e3 15988->15990 15990->15943 15993 406214 GetLastError CloseHandle CreateFileW ReadFile 15992->15993 15995 40e03c 15993->15995 15994 40e16b 15994->15977 15995->15994 15996 40dd85 57 API calls 15995->15996 15997 40e06b 15996->15997 15997->15994 15998 40afcf ??2@YAPAXI ??3@YAXPAX 15997->15998 15999 40e08d OpenProcess 15998->15999 16000 40e152 15999->16000 16001 40e0a4 GetCurrentProcess DuplicateHandle 15999->16001 16002 40e160 16000->16002 16005 406214 GetLastError CloseHandle CreateFileW ReadFile 16000->16005 16003 40e0d0 GetFileSize 16001->16003 16004 40e14a CloseHandle 16001->16004 16006 40b04b ??3@YAXPAX 16002->16006 16007 40e0ea 16003->16007 16004->16000 16005->16002 16006->15994 16008 4096dc CreateFileW 16007->16008 16009 40e0f1 CreateFileMappingW 16008->16009 16010 40e140 CloseHandle CloseHandle 16009->16010 16011 40e10b MapViewOfFile 16009->16011 16010->16004 16012 40e13b CloseHandle 16011->16012 16013 40e11f WriteFile UnmapViewOfFile 16011->16013 16012->16010 16013->16012 16015 40e18c 16014->16015 16016 40e1a7 memset 16015->16016 16017 40e299 16015->16017 16018 40e1e8 16016->16018 16017->15982 16019 40e283 16018->16019 16023 40e244 _snwprintf 16018->16023 16020 40e291 16019->16020 16021 40e288 ??3@YAXPAX 16019->16021 16022 40aa04 ??3@YAXPAX 16020->16022 16021->16020 16022->16017 16023->16018 16031 40e2c2 16024->16031 16025 40e4a0 16025->15982 16026 40e489 16027 40aa04 ??3@YAXPAX 16026->16027 16028 40e491 16027->16028 16028->16025 16029 40e497 ??3@YAXPAX 16028->16029 16029->16025 16030 40e376 memset 16030->16031 16031->16025 16031->16026 16031->16030 16032 40e3e0 memcpy 16031->16032 16033 40e3b3 wcschr 16031->16033 16034 40e3fb memcpy 16031->16034 16035 40e416 memcpy 16031->16035 16036 40e431 memcpy 16031->16036 16032->16031 16033->16031 16034->16031 16035->16031 16036->16031 16037->15973 16038->15905 16039->15909 16041 405335 16040->16041 16042 40522a 16040->16042 16041->15651 16043 40b2cc 27 API calls 16042->16043 16044 405234 16043->16044 16085 40a804 memset 16044->16085 16048 405248 _mbscpy _mbscat GetProcAddress 16049 40b273 27 API calls 16048->16049 16050 405279 16049->16050 16095 405211 GetProcAddress 16050->16095 16052 405282 16053 40b273 27 API calls 16052->16053 16054 40528f 16053->16054 16096 405211 GetProcAddress 16054->16096 16056 405298 16057 40b273 27 API calls 16056->16057 16058 4052a5 16057->16058 16097 405211 GetProcAddress 16058->16097 16060 4052ae 16061 40b273 27 API calls 16060->16061 16062 4052bb 16061->16062 16098 405211 GetProcAddress 16062->16098 16064 4052c4 16065 40b273 27 API calls 16064->16065 16066 4052d1 16065->16066 16099 405211 GetProcAddress 16066->16099 16068 4052da 16069 40b273 27 API calls 16068->16069 16070 4052e7 16069->16070 16100 405211 GetProcAddress 16070->16100 16072 4052f0 16073 40b273 27 API calls 16072->16073 16074 4052fd 16073->16074 16101 405211 GetProcAddress 16074->16101 16076 405306 16077 40b273 27 API calls 16076->16077 16078 405313 16077->16078 16102 405211 GetProcAddress 16078->16102 16080 40531c 16081 40b273 27 API calls 16080->16081 16082 405329 16081->16082 16103 405211 GetProcAddress 16082->16103 16084 405332 16084->16041 16086 40a83b GetSystemDirectoryW 16085->16086 16087 40a84c wcscpy 16085->16087 16086->16087 16088 409719 16087->16088 16089 40a864 wcscat LoadLibraryW 16088->16089 16090 40a881 LoadLibraryW 16089->16090 16091 40523a 16089->16091 16090->16091 16092 40b273 16091->16092 16104 40b58d 16092->16104 16094 40b18c 16094->16048 16095->16052 16096->16056 16097->16060 16098->16064 16099->16068 16100->16072 16101->16076 16102->16080 16103->16084 16105 40b5a4 GetModuleHandleW FindResourceW 16104->16105 16106 40b62e 16104->16106 16107 40b5c2 LoadResource 16105->16107 16109 40b5e7 16105->16109 16106->16094 16108 40b5d0 SizeofResource LockResource 16107->16108 16107->16109 16108->16109 16109->16106 16110 40afcf ??2@YAPAXI ??3@YAXPAX 16109->16110 16111 40b608 memcpy 16110->16111 16112 40b4d3 memcpy 16111->16112 16113 40b61e 16112->16113 16114 40b3c1 18 API calls 16113->16114 16115 40b626 16114->16115 16116 40b04b ??3@YAXPAX 16115->16116 16116->16106 16118 40440c FreeLibrary 16117->16118 16119 40436d 16118->16119 16120 40a804 6 API calls 16119->16120 16121 404377 16120->16121 16122 404383 16121->16122 16123 404405 16121->16123 16124 40b273 27 API calls 16122->16124 16123->15655 16123->15657 16123->15658 16125 40438d GetProcAddress 16124->16125 16126 40b273 27 API calls 16125->16126 16127 4043a7 GetProcAddress 16126->16127 16128 40b273 27 API calls 16127->16128 16129 4043ba GetProcAddress 16128->16129 16130 40b273 27 API calls 16129->16130 16131 4043ce GetProcAddress 16130->16131 16132 40b273 27 API calls 16131->16132 16133 4043e2 GetProcAddress 16132->16133 16134 4043f1 16133->16134 16135 4043f7 16134->16135 16136 40440c FreeLibrary 16134->16136 16135->16123 16136->16123 16138 404413 FreeLibrary 16137->16138 16139 40441e 16137->16139 16138->16139 16139->15671 16141 40447e 16140->16141 16142 40442e 16140->16142 16143 404485 CryptUnprotectData 16141->16143 16144 40449c 16141->16144 16145 40b2cc 27 API calls 16142->16145 16143->16144 16144->15669 16146 404438 16145->16146 16147 40a804 6 API calls 16146->16147 16148 40443e 16147->16148 16149 404445 16148->16149 16150 404467 16148->16150 16151 40b273 27 API calls 16149->16151 16150->16141 16153 404475 FreeLibrary 16150->16153 16152 40444f GetProcAddress 16151->16152 16152->16150 16154 404460 16152->16154 16153->16141 16154->16150 16156 4135f6 16155->16156 16157 4135eb FreeLibrary 16155->16157 16156->15674 16157->16156 16159 4449c4 16158->16159 16160 444a52 16158->16160 16161 40b2cc 27 API calls 16159->16161 16160->15691 16160->15694 16162 4449cb 16161->16162 16163 40a804 6 API calls 16162->16163 16164 4449d1 16163->16164 16165 40b273 27 API calls 16164->16165 16166 4449dc GetProcAddress 16165->16166 16167 40b273 27 API calls 16166->16167 16168 4449f3 GetProcAddress 16167->16168 16169 40b273 27 API calls 16168->16169 16170 444a04 GetProcAddress 16169->16170 16171 40b273 27 API calls 16170->16171 16172 444a15 GetProcAddress 16171->16172 16173 40b273 27 API calls 16172->16173 16174 444a26 GetProcAddress 16173->16174 16175 40b273 27 API calls 16174->16175 16176 444a37 GetProcAddress 16175->16176 16177 40b273 27 API calls 16176->16177 16178 444a48 GetProcAddress 16177->16178 16178->16160 16180 403a29 16179->16180 16192 403bed memset memset 16180->16192 16182 403ae7 16200 40b1ab ??3@YAXPAX ??3@YAXPAX 16182->16200 16183 403a3f memset 16187 403a2f 16183->16187 16185 4039a3 16185->15701 16185->15702 16186 409b98 GetFileAttributesW 16186->16187 16187->16182 16187->16183 16187->16186 16188->15704 16190 40a051 GetFileTime CloseHandle 16189->16190 16191 4039ca CompareFileTime 16189->16191 16190->16191 16191->15701 16193 414c2e 6 API calls 16192->16193 16194 403c38 16193->16194 16195 403c3f wcscat 16194->16195 16196 414c2e 6 API calls 16195->16196 16197 403c61 16196->16197 16198 403c68 wcscat 16197->16198 16199 403c88 16198->16199 16199->16187 16200->16185 16202 404190 16201->16202 16213 409b98 GetFileAttributesW 16202->16213 16204 40419c 16205 4041a7 6 API calls 16204->16205 16206 40435c 16204->16206 16209 40424f 16205->16209 16206->15718 16208 40425e memset 16208->16209 16210 404296 wcscpy 16208->16210 16209->16206 16209->16208 16211 4042b6 memset memset _snwprintf wcscpy 16209->16211 16214 414842 16209->16214 16210->16209 16211->16209 16212->15717 16213->16204 16217 41443e 16214->16217 16216 414866 16216->16209 16218 41444b 16217->16218 16219 414451 16218->16219 16220 4144a3 GetPrivateProfileStringW 16218->16220 16221 414491 16219->16221 16222 414455 wcschr 16219->16222 16220->16216 16224 414495 WritePrivateProfileStringW 16221->16224 16222->16221 16223 414463 _snwprintf 16222->16223 16223->16224 16224->16216 16244 413f4f 16225->16244 16228 413f37 K32GetModuleFileNameExW 16229 413f4a 16228->16229 16229->15732 16231 413cb0 GetModuleHandleW 16230->16231 16232 413cda 16230->16232 16231->16232 16233 413cbf GetProcAddress 16231->16233 16234 413ce3 GetProcessTimes 16232->16234 16235 413cf6 16232->16235 16233->16232 16234->15734 16235->15734 16237 409a41 16236->16237 16238 4099fb malloc 16236->16238 16237->15728 16240 409a37 16238->16240 16241 409a1c 16238->16241 16240->15728 16242 409a30 ??3@YAXPAX 16241->16242 16243 409a20 memcpy 16241->16243 16242->16240 16243->16242 16245 413f2f 16244->16245 16246 413f54 16244->16246 16245->16228 16245->16229 16247 40a804 6 API calls 16246->16247 16248 413f5f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 16247->16248 16248->16245 16249->15745 16250->15755 16251->15765 16253 4145d1 RegCloseKey 16252->16253 16253->15764 16254->15809 16256 40bba5 16255->16256 16292 40cc26 16256->16292 16259 40bd43 16259->15810 16262 40b2cc 27 API calls 16263 40bbef 16262->16263 16263->16259 16264 40cf04 8 API calls 16263->16264 16265 40bc2e 16264->16265 16265->16259 16266 40b2cc 27 API calls 16265->16266 16268 40bc40 16266->16268 16267 40bc61 memset memset WideCharToMultiByte 16312 40103c strlen 16267->16312 16268->16259 16268->16267 16270 40bcc0 16271 40b273 27 API calls 16270->16271 16272 40bcd0 memcmp 16271->16272 16272->16259 16273 40bce2 16272->16273 16274 404423 36 API calls 16273->16274 16275 40bd10 16274->16275 16275->16259 16276 40bd3a LocalFree 16275->16276 16277 40bd1f memcpy 16275->16277 16276->16259 16277->16276 16279 44444c 16278->16279 16280 4444b9 memcpy 16279->16280 16283 4444a4 16279->16283 16281 444524 16280->16281 16281->16283 16335 41eed2 16281->16335 16283->15818 16358 438460 16284->16358 16286 40b8a4 16286->15828 16287 4251c4 16286->16287 16288 4251e4 16287->16288 16290 4251e8 16288->16290 16393 4384e9 16288->16393 16290->15836 16291->15836 16314 4096c3 CreateFileW 16292->16314 16294 40cc34 16295 40cc3d GetFileSize 16294->16295 16296 40bbca 16294->16296 16297 40afcf 2 API calls 16295->16297 16296->16259 16303 40cf04 16296->16303 16298 40cc64 16297->16298 16315 40a2ef ReadFile 16298->16315 16300 40cc71 16301 40cc95 FindCloseChangeNotification 16300->16301 16302 40b04b ??3@YAXPAX 16301->16302 16302->16296 16304 40b633 ??3@YAXPAX 16303->16304 16305 40cf14 16304->16305 16316 40b1ab ??3@YAXPAX ??3@YAXPAX 16305->16316 16307 40bbdd 16307->16259 16307->16262 16308 40cf1b 16308->16307 16310 40cfef 16308->16310 16317 40cd4b 16308->16317 16311 40cd4b 5 API calls 16310->16311 16311->16307 16313 40105b 16312->16313 16313->16270 16314->16294 16315->16300 16316->16308 16321 40cd7b 16317->16321 16318 40cef5 16319 40aa04 ??3@YAXPAX 16318->16319 16320 40cefd 16319->16320 16320->16308 16321->16318 16329 40d00b 16321->16329 16324 40aa04 ??3@YAXPAX 16325 40cee5 16324->16325 16326 40aa04 ??3@YAXPAX 16325->16326 16327 40ceed 16326->16327 16328 40aa04 ??3@YAXPAX 16327->16328 16328->16318 16330 40d016 16329->16330 16334 40cedd 16329->16334 16331 40d028 16330->16331 16332 40d01f ??3@YAXPAX 16330->16332 16333 4099f4 malloc memcpy ??3@YAXPAX 16331->16333 16332->16334 16333->16334 16334->16324 16336 41eee2 16335->16336 16337 41ef74 memset 16336->16337 16338 41ef2d 16336->16338 16339 41ef91 16337->16339 16341 41ef9e 16337->16341 16338->16283 16343 41519d 16339->16343 16341->16338 16346 41b1ca 16341->16346 16350 4175ed 16343->16350 16347 41b1e4 16346->16347 16348 41b253 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@ 16347->16348 16349 41b243 16347->16349 16348->16349 16349->16338 16351 417570 SetFilePointer GetLastError GetLastError 16350->16351 16352 4175ff 16351->16352 16353 41760a ReadFile 16352->16353 16354 4151b3 16352->16354 16355 417637 16353->16355 16356 417627 GetLastError 16353->16356 16354->16341 16355->16354 16357 41763e memset 16355->16357 16356->16354 16357->16354 16359 43847a 16358->16359 16362 43847e 16359->16362 16364 438270 16359->16364 16361 4384aa 16361->16362 16363 438270 54 API calls 16361->16363 16362->16286 16363->16362 16366 43828d 16364->16366 16365 438341 16377 44358f 16365->16377 16366->16365 16368 438297 16366->16368 16369 4382d6 16366->16369 16368->16361 16369->16368 16370 44358f 2 API calls 16369->16370 16372 438318 16369->16372 16370->16372 16371 438373 16373 438383 16371->16373 16375 4300e8 2 API calls 16371->16375 16372->16371 16385 43819e 16372->16385 16373->16368 16389 42453e 16373->16389 16375->16373 16378 4435be 16377->16378 16379 4165ff memcpy 16378->16379 16380 44366c 16378->16380 16383 44360c 16378->16383 16379->16380 16381 43024d memset 16380->16381 16382 443826 16380->16382 16381->16382 16382->16383 16384 43024d memset 16382->16384 16383->16372 16384->16382 16386 438246 16385->16386 16387 4381ba 16385->16387 16386->16371 16387->16386 16388 41f432 50 API calls 16387->16388 16388->16387 16390 42454f 16389->16390 16391 42455b 16390->16391 16392 424474 memset memcpy 16390->16392 16391->16368 16392->16391 16394 4384f6 16393->16394 16395 438460 54 API calls 16394->16395 16396 438517 16395->16396 16397 42453e 2 API calls 16396->16397 16398 43851e 16396->16398 16397->16398 16398->16288 16399->15852 16400->15858 16401->15864 16402->15870 16404 40aa04 ??3@YAXPAX 16403->16404 16405 445370 16404->16405 16406 40aa04 ??3@YAXPAX 16405->16406 16407 445378 16406->16407 16408 40aa04 ??3@YAXPAX 16407->16408 16409 445380 16408->16409 16410 40aa04 ??3@YAXPAX 16409->16410 16411 445311 16410->16411 16411->15619 16412 4147f3 16415 414561 16412->16415 16414 414813 16416 41456d 16415->16416 16417 41457f GetPrivateProfileIntW 16415->16417 16420 4143f1 memset _itow WritePrivateProfileStringW 16416->16420 16417->16414 16419 41457a 16419->16414 16420->16419 16421 44def7 16422 44df07 16421->16422 16423 44df00 ??3@YAXPAX 16421->16423 16424 44df17 16422->16424 16425 44df10 ??3@YAXPAX 16422->16425 16423->16422 16426 44df27 16424->16426 16427 44df20 ??3@YAXPAX 16424->16427 16425->16424 16428 44df37 16426->16428 16429 44df30 ??3@YAXPAX 16426->16429 16427->16426 16429->16428 17159 4062f7 17160 406310 17159->17160 17162 40631f 17159->17162 17165 4062a6 SetFilePointerEx 17160->17165 17163 4062a6 2 API calls 17162->17163 17164 406345 17162->17164 17163->17164 17168 40a2ef ReadFile 17165->17168 17167 4062d4 17167->17162 17168->17167 15306 418981 memset GetSystemInfo 15307 4189a0 15306->15307 15308 44dea5 15309 44deb5 FreeLibrary 15308->15309 15310 44dec3 15308->15310 15309->15310 16452 40b0b5 ??3@YAXPAX ??3@YAXPAX 16453 4175b7 16454 4175d6 FindCloseChangeNotification 16453->16454 16455 4175c8 16454->16455 16456 4175df 16454->16456 16455->16456 16457 4175ce Sleep 16455->16457 16457->16454 16458 4148b6 FindResourceW 16459 4148cf SizeofResource 16458->16459 16462 4148f9 16458->16462 16460 4148e0 LoadResource 16459->16460 16459->16462 16461 4148ee LockResource 16460->16461 16460->16462 16461->16462

                          Executed Functions

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 FindCloseChangeNotification GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 353 40de5a 351->353 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 355 40de5d-40de63 353->355 357 40de74-40de78 355->357 358 40de65-40de6c 355->358 357->352 357->355 358->357 361 40de6e-40de71 358->361 361->357 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 373 40dff8-40dffb 370->373 374 40defd-40df02 370->374 371->370 372 40ded0-40dee1 _wcsicmp 371->372 372->370 375 40dffd-40e006 372->375 373->363 373->375 376 40df08 374->376 377 40dfef-40dff2 CloseHandle 374->377 375->362 375->363 378 40df0b-40df10 376->378 377->373 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 382 40df23-40df4a GetCurrentProcess DuplicateHandle 379->382 380->378 381 40dfd1-40dfd3 380->381 381->377 382->380 383 40df4c-40df76 memset call 41352f 382->383 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->377
                          APIs
                          • memset.MSVCRT ref: 0040DDAD
                            • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                          • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                            • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                            • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                            • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                            • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                            • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                            • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                            • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                            • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                            • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                            • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                          • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                          • FindCloseChangeNotification.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                          • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                          • _wcsicmp.MSVCRT ref: 0040DEB2
                          • _wcsicmp.MSVCRT ref: 0040DEC5
                          • _wcsicmp.MSVCRT ref: 0040DED8
                          • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                          • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                          • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                          • memset.MSVCRT ref: 0040DF5F
                          • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                          • _wcsicmp.MSVCRT ref: 0040DFB2
                          • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: AddressProc$Handle_wcsicmp$CloseProcess$CurrentFileModulememset$??2@ChangeCreateDuplicateFindInformationNameNotificationOpenQuerySystem
                          • String ID: dllhost.exe$taskhost.exe$taskhostex.exe
                          • API String ID: 594330280-3398334509
                          • Opcode ID: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                          • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                          • Opcode Fuzzy Hash: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                          • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 504 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 507 413f00-413f11 Process32NextW 504->507 508 413da5-413ded OpenProcess 507->508 509 413f17-413f24 CloseHandle 507->509 510 413eb0-413eb5 508->510 511 413df3-413e26 memset call 413f27 508->511 510->507 512 413eb7-413ebd 510->512 519 413e79-413e9d call 413959 call 413ca4 511->519 520 413e28-413e35 511->520 514 413ec8-413eda call 4099f4 512->514 515 413ebf-413ec6 ??3@YAXPAX@Z 512->515 517 413edb-413ee2 514->517 515->517 525 413ee4 517->525 526 413ee7-413efe 517->526 531 413ea2-413eae CloseHandle 519->531 523 413e61-413e68 520->523 524 413e37-413e44 GetModuleHandleW 520->524 523->519 529 413e6a-413e76 523->529 524->523 528 413e46-413e5c GetProcAddress 524->528 525->526 526->507 528->523 529->519 531->510
                          APIs
                            • Part of subcall function 0040B633: ??3@YAXPAX@Z.MSVCRT ref: 0040B63A
                          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00413D6A
                          • memset.MSVCRT ref: 00413D7F
                          • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                          • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                          • memset.MSVCRT ref: 00413E07
                          • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                          • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                          • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                          • ??3@YAXPAX@Z.MSVCRT ref: 00413EC1
                          • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                          • CloseHandle.KERNEL32(00000000,00000000,0000022C), ref: 00413F1A
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: Handle$??3@CloseProcess32memset$AddressCreateFirstModuleNextOpenProcProcessSnapshotToolhelp32
                          • String ID: QueryFullProcessImageNameW$kernel32.dll
                          • API String ID: 912665193-1740548384
                          • Opcode ID: 05c61bdc91198e39abb6d6ee7ce09e8b8423f2cda011bdf5068888dae1005bc1
                          • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                          • Opcode Fuzzy Hash: 05c61bdc91198e39abb6d6ee7ce09e8b8423f2cda011bdf5068888dae1005bc1
                          • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 771 40b58d-40b59e 772 40b5a4-40b5c0 GetModuleHandleW FindResourceW 771->772 773 40b62e-40b632 771->773 774 40b5c2-40b5ce LoadResource 772->774 775 40b5e7 772->775 774->775 777 40b5d0-40b5e5 SizeofResource LockResource 774->777 776 40b5e9-40b5eb 775->776 776->773 778 40b5ed-40b5ef 776->778 777->776 778->773 779 40b5f1-40b621 call 40afcf memcpy call 40b4d3 call 40b3c1 778->779 785 40b626-40b629 call 40b04b 779->785 785->773
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,00000000,?,?), ref: 0040B5A5
                          • FindResourceW.KERNELBASE(00000000,00000032,BIN), ref: 0040B5B6
                          • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                          • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                          • LockResource.KERNEL32(00000000), ref: 0040B5DD
                          • memcpy.MSVCRT ref: 0040B60D
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                          • String ID: BIN
                          • API String ID: 1668488027-1015027815
                          • Opcode ID: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                          • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                          • Opcode Fuzzy Hash: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                          • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                            • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                            • Part of subcall function 00418680: ??3@YAXPAX@Z.MSVCRT ref: 004186C7
                            • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                          • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                          • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                          • ??3@YAXPAX@Z.MSVCRT ref: 00418803
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??3@DiskFreeSpace$FullNamePathVersionmalloc
                          • String ID:
                          • API String ID: 2947809556-0
                          • Opcode ID: e9fa8cdb0503d843af4e6d4979f9032e8967895c6ef67b6505ea85934ab3b907
                          • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                          • Opcode Fuzzy Hash: e9fa8cdb0503d843af4e6d4979f9032e8967895c6ef67b6505ea85934ab3b907
                          • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                            • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                            • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                            • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                            • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                            • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                          • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                          • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: Library$Load$AddressCryptDataDirectoryFreeProcSystemUnprotectmemsetwcscatwcscpy
                          • String ID:
                          • API String ID: 767404330-0
                          • Opcode ID: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                          • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                          • Opcode Fuzzy Hash: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                          • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                          • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: FileFind$FirstNext
                          • String ID:
                          • API String ID: 1690352074-0
                          • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                          • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                          • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                          • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 38 44558e-445594 call 444b06 4->38 39 44557e-44558c call 4136c0 call 41366b 4->39 15 4455e5 5->15 16 4455e8-4455f9 5->16 10 445800-445809 6->10 13 445856-44585f 10->13 14 44580b-44581e call 40a889 call 403e2d 10->14 18 445861-445874 call 40a889 call 403c9c 13->18 19 4458ac-4458b5 13->19 41 445823-445826 14->41 15->16 21 445672-44567b call 40a889 call 403fbe 16->21 22 4455fb-445601 16->22 50 445879-44587c 18->50 23 44594f-445958 19->23 24 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 19->24 69 445680-445683 21->69 32 445605-445607 22->32 33 445603 22->33 30 4459f2-4459fa 23->30 31 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 23->31 140 44592d-445945 call 40b6ef 24->140 141 44594a 24->141 43 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 30->43 44 445b29-445b32 30->44 145 4459d0-4459e8 call 40b6ef 31->145 146 4459ed 31->146 32->21 37 445609-44560d 32->37 33->32 37->21 48 44560f-445641 call 4087b3 call 40a889 call 4454bf 37->48 38->3 39->38 51 44584c-445854 call 40b1ab 41->51 52 445828 41->52 182 445b08-445b15 call 40ae51 43->182 53 445c7c-445c85 44->53 54 445b38-445b96 memset * 3 44->54 156 445665-445670 call 40b1ab 48->156 157 445643-445663 call 40a9b5 call 4087b3 48->157 64 4458a2-4458aa call 40b1ab 50->64 65 44587e 50->65 51->13 66 44582e-445847 call 40a9b5 call 4087b3 52->66 60 445d1c-445d25 53->60 61 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 53->61 67 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 54->67 68 445b98-445ba0 54->68 82 445fae-445fb2 60->82 83 445d2b-445d3b 60->83 160 445cf5 61->160 161 445cfc-445d03 61->161 64->19 75 445884-44589d call 40a9b5 call 4087b3 65->75 143 445849 66->143 249 445c77 67->249 68->67 76 445ba2-445bcf call 4099c6 call 445403 call 445389 68->76 77 445685 69->77 78 4456b2-4456b5 call 40b1ab 69->78 148 44589f 75->148 76->53 93 44568b-4456b0 call 40a9b5 call 4087b3 77->93 110 4456ba-4456c4 78->110 98 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 83->98 99 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 83->99 93->78 166 445d67-445d6c 98->166 167 445d71-445d83 call 445093 98->167 193 445e17 99->193 194 445e1e-445e25 99->194 123 4457f9 110->123 124 4456ca-4456d3 call 413cfa call 413d4c 110->124 123->6 174 4456d8-4456f7 call 40b2cc call 413fa6 124->174 140->141 141->23 143->51 145->146 146->30 148->64 156->110 157->156 160->161 171 445d05-445d13 161->171 172 445d17 161->172 176 445fa1-445fa9 call 40b6ef 166->176 167->82 171->172 172->60 207 4456fd-445796 memset * 4 call 409c70 * 3 174->207 208 4457ea-4457f7 call 413d29 174->208 176->82 202 445b17-445b27 call 40aebe 182->202 203 445aa3-445ab0 call 40add4 182->203 193->194 198 445e27-445e59 call 40b2cc call 409d1f call 409b98 194->198 199 445e6b-445e7e call 445093 194->199 239 445e62-445e69 198->239 240 445e5b 198->240 220 445f67-445f99 call 40b2cc call 409d1f call 409b98 199->220 202->44 203->182 221 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 203->221 207->208 248 445798-4457ca call 40b2cc call 409d1f call 409b98 207->248 208->10 220->82 254 445f9b 220->254 221->182 239->199 245 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 239->245 240->239 265 445f4d-445f5a call 40ae51 245->265 248->208 264 4457cc-4457e5 call 4087b3 248->264 249->53 254->176 264->208 269 445ef7-445f04 call 40add4 265->269 270 445f5c-445f62 call 40aebe 265->270 269->265 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->220 274->265 281 445f3a-445f48 call 445093 274->281 281->265
                          APIs
                          • memset.MSVCRT ref: 004455C2
                          • wcsrchr.MSVCRT ref: 004455DA
                          • memset.MSVCRT ref: 0044570D
                          • memset.MSVCRT ref: 00445725
                            • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                            • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                            • Part of subcall function 0040BDB0: CredEnumerateW.SECHOST(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                            • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                            • Part of subcall function 0040BDB0: _wcsncoll.MSVCRT ref: 0040BE38
                            • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                            • Part of subcall function 0040BDB0: memcpy.MSVCRT ref: 0040BEB2
                            • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                          • memset.MSVCRT ref: 0044573D
                          • memset.MSVCRT ref: 00445755
                          • memset.MSVCRT ref: 004458CB
                          • memset.MSVCRT ref: 004458E3
                          • memset.MSVCRT ref: 0044596E
                          • memset.MSVCRT ref: 00445A10
                          • memset.MSVCRT ref: 00445A28
                          • memset.MSVCRT ref: 00445AC6
                            • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                            • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                            • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                            • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                            • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT ref: 004450F0
                            • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                          • memset.MSVCRT ref: 00445B52
                          • memset.MSVCRT ref: 00445B6A
                          • memset.MSVCRT ref: 00445C9B
                          • memset.MSVCRT ref: 00445CB3
                          • _wcsicmp.MSVCRT ref: 00445D56
                          • memset.MSVCRT ref: 00445B82
                            • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                            • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                            • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                            • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                            • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                            • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                            • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                          • memset.MSVCRT ref: 00445986
                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                            • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateFolderHandlePathProcSizeSpecial_wcsicmp_wcslwr_wcsncollmemcpywcscatwcscpy
                          • String ID: *.*$Apple Computer\Preferences\keychain.plist
                          • API String ID: 2151808875-3798722523
                          • Opcode ID: 8320a57399db62c9384808c231969f658b87241fbcb6c2f23815a8bc87aa57e2
                          • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                          • Opcode Fuzzy Hash: 8320a57399db62c9384808c231969f658b87241fbcb6c2f23815a8bc87aa57e2
                          • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                            • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                            • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                            • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000), ref: 004044E9
                            • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                          • SetErrorMode.KERNELBASE(00008001), ref: 00412799
                          • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000), ref: 004127B2
                          • EnumResourceTypesW.KERNEL32(00000000), ref: 004127B9
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                          • String ID: $/deleteregkey$/savelangfile
                          • API String ID: 2744995895-28296030
                          • Opcode ID: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                          • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                          • Opcode Fuzzy Hash: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                          • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          • memset.MSVCRT ref: 0040B71C
                            • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                            • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                          • wcsrchr.MSVCRT ref: 0040B738
                          • memset.MSVCRT ref: 0040B756
                          • memset.MSVCRT ref: 0040B7F5
                          • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                          • CopyFileW.KERNEL32(00445FAE,?,00000000,?,?), ref: 0040B82D
                          • FindCloseChangeNotification.KERNELBASE(00000000,?,?), ref: 0040B838
                          • memset.MSVCRT ref: 0040B851
                          • memset.MSVCRT ref: 0040B8CA
                          • memcmp.MSVCRT ref: 0040B9BF
                            • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                            • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                            • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                          • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0040BAE5
                          • memset.MSVCRT ref: 0040BB53
                          • memcpy.MSVCRT ref: 0040BB66
                          • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset$File$Freewcsrchr$AddressChangeCloseCopyCreateCryptDataDeleteFindLibraryLocalNotificationProcUnprotectmemcmpmemcpywcscpy
                          • String ID: chp$v10
                          • API String ID: 580435826-2783969131
                          • Opcode ID: b642f203d15064d315541d918ad2526bb414326ad23a5a830d1949435d8ad222
                          • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                          • Opcode Fuzzy Hash: b642f203d15064d315541d918ad2526bb414326ad23a5a830d1949435d8ad222
                          • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                            • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                            • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                            • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                            • Part of subcall function 0040DD85: FindCloseChangeNotification.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                            • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                            • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                            • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                          • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                          • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                          • DuplicateHandle.KERNEL32(?,00000104,00000000), ref: 0040E0BF
                          • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                            • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                            • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                            • Part of subcall function 00409A45: GetTempFileNameW.KERNEL32(?,0040B827,00000000,?), ref: 00409A85
                            • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                          • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                          • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                          • WriteFile.KERNEL32(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                          • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                          • CloseHandle.KERNEL32(?), ref: 0040E13E
                          • CloseHandle.KERNEL32(00000000), ref: 0040E143
                          • CloseHandle.KERNEL32(?), ref: 0040E148
                          • CloseHandle.KERNEL32(?), ref: 0040E14D
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: File$CloseHandle$CreateProcess$CurrentTempView$??2@ChangeDirectoryDuplicateFindInformationMappingNameNotificationOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                          • String ID: bhv
                          • API String ID: 3399910952-2689659898
                          • Opcode ID: 581cd955e5f2635261495d2059987c80485bc08b8db92cd2fad541764a57ada3
                          • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                          • Opcode Fuzzy Hash: 581cd955e5f2635261495d2059987c80485bc08b8db92cd2fad541764a57ada3
                          • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 560 413f4f-413f52 561 413fa5 560->561 562 413f54-413f5a call 40a804 560->562 564 413f5f-413fa4 GetProcAddress * 5 562->564 564->561
                          APIs
                            • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                            • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                            • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                            • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                            • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                          • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                          • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                          • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                          • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                          • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                          • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                          • API String ID: 2941347001-70141382
                          • Opcode ID: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                          • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                          • Opcode Fuzzy Hash: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                          • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 565 4466f4-44670e call 446904 GetModuleHandleA 568 446710-44671b 565->568 569 44672f-446732 565->569 568->569 570 44671d-446726 568->570 571 44675b-4467aa __set_app_type __p__fmode __p__commode call 4153f2 569->571 572 446747-44674b 570->572 573 446728-44672d 570->573 578 4467ac-4467b7 __setusermatherr 571->578 579 4467b8-44680e call 4468f0 _initterm __wgetmainargs _initterm 571->579 572->569 576 44674d-44674f 572->576 573->569 575 446734-44673b 573->575 575->569 580 44673d-446745 575->580 581 446755-446758 576->581 578->579 584 446810-446819 579->584 585 44681e-446825 579->585 580->581 581->571 586 4468d8-4468dd call 44693d 584->586 587 446827-446832 585->587 588 44686c-446870 585->588 589 446834-446838 587->589 590 44683a-44683e 587->590 592 446845-44684b 588->592 593 446872-446877 588->593 589->587 589->590 590->592 594 446840-446842 590->594 596 446853-446864 GetStartupInfoW 592->596 597 44684d-446851 592->597 593->588 594->592 598 446866-44686a 596->598 599 446879-44687b 596->599 597->594 597->596 600 44687c-446894 GetModuleHandleA call 41276d 598->600 599->600 603 446896-446897 exit 600->603 604 44689d-4468d6 _cexit 600->604 603->604 604->586
                          APIs
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: HandleModule_initterm$InfoStartup__p__commode__p__fmode__set_app_type__setusermatherr__wgetmainargs_cexitexit
                          • String ID:
                          • API String ID: 2827331108-0
                          • Opcode ID: ac973ed8bce866ca224172ea4b7a237c44716a7d542afe8b7082d44fa5742df9
                          • Instruction ID: 0e3254bf032efe29fc581ce6ca9889a5a3d5d0d8e47fd2ea34fa35870f4f4cb9
                          • Opcode Fuzzy Hash: ac973ed8bce866ca224172ea4b7a237c44716a7d542afe8b7082d44fa5742df9
                          • Instruction Fuzzy Hash: 9D51C474C41314DFEB21AF65D8499AD7BB0FB0A715F21452BE82197291D7788C82CF1E
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          • memset.MSVCRT ref: 0040C298
                            • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                            • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                            • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                            • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                          • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                          • wcschr.MSVCRT ref: 0040C324
                          • wcschr.MSVCRT ref: 0040C344
                          • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                          • GetLastError.KERNEL32 ref: 0040C373
                          • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                          • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstFolderLastPathSpecial
                          • String ID: visited:
                          • API String ID: 2470578098-1702587658
                          • Opcode ID: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                          • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                          • Opcode Fuzzy Hash: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                          • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                            • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                            • Part of subcall function 0040CC26: FindCloseChangeNotification.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                            • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                          • memset.MSVCRT ref: 0040BC75
                          • memset.MSVCRT ref: 0040BC8C
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,0044E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                          • memcmp.MSVCRT ref: 0040BCD6
                          • memcpy.MSVCRT ref: 0040BD2B
                          • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset$ByteChangeCharCloseFileFindFreeLocalMultiNotificationSizeWide_wcsicmpmemcmpmemcpy
                          • String ID:
                          • API String ID: 509814883-3916222277
                          • Opcode ID: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                          • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                          • Opcode Fuzzy Hash: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                          • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 683 41837f-4183bf 684 4183c1-4183cc call 418197 683->684 685 4183dc-4183ec call 418160 683->685 690 4183d2-4183d8 684->690 691 418517-41851d 684->691 692 4183f6-41840b 685->692 693 4183ee-4183f1 685->693 690->685 694 418417-418423 692->694 695 41840d-418415 692->695 693->691 696 418427-418442 call 41739b 694->696 695->696 699 418444-41845d CreateFileW 696->699 700 41845f-418475 CreateFileA 696->700 701 418477-41847c 699->701 700->701 702 4184c2-4184c7 701->702 703 41847e-418495 GetLastError ??3@YAXPAX@Z 701->703 706 4184d5-418501 memset call 418758 702->706 707 4184c9-4184d3 702->707 704 4184b5-4184c0 call 444706 703->704 705 418497-4184b3 call 41837f 703->705 704->691 705->691 713 418506-418515 ??3@YAXPAX@Z 706->713 707->706 713->691
                          APIs
                          • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                          • CreateFileA.KERNEL32(?,-7FBE829D,00000003,00000000,|A,00417CE3,00000000), ref: 0041846F
                          • GetLastError.KERNEL32 ref: 0041847E
                          • ??3@YAXPAX@Z.MSVCRT ref: 0041848B
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: CreateFile$??3@ErrorLast
                          • String ID: |A
                          • API String ID: 1407640353-1717621600
                          • Opcode ID: 71e54c5a76e1aa47306962d20987635381793afdf9523ab11eb51246902c22e1
                          • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                          • Opcode Fuzzy Hash: 71e54c5a76e1aa47306962d20987635381793afdf9523ab11eb51246902c22e1
                          • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                          • String ID: r!A
                          • API String ID: 2791114272-628097481
                          • Opcode ID: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                          • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                          • Opcode Fuzzy Hash: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                          • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                            • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1AE
                            • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1B6
                            • Part of subcall function 0040AA04: ??3@YAXPAX@Z.MSVCRT ref: 0040AA0B
                            • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                            • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                            • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                            • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                            • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                            • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                            • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                            • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                            • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                            • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                            • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                          • _wcslwr.MSVCRT ref: 0040C817
                            • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                            • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                          • wcslen.MSVCRT ref: 0040C82C
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset$??3@$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                          • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                          • API String ID: 62308376-4196376884
                          • Opcode ID: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                          • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                          • Opcode Fuzzy Hash: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                          • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 787 40a804-40a839 memset 788 40a83b-40a847 GetSystemDirectoryW 787->788 789 40a84c-40a87f wcscpy call 409719 wcscat LoadLibraryW 787->789 788->789 792 40a881-40a884 LoadLibraryW 789->792 793 40a886-40a888 789->793 792->793
                          APIs
                          • memset.MSVCRT ref: 0040A824
                          • GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                          • wcscpy.MSVCRT ref: 0040A854
                          • wcscat.MSVCRT ref: 0040A86A
                          • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                          • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                          • String ID: C:\Windows\system32
                          • API String ID: 669240632-2896066436
                          • Opcode ID: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                          • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                          • Opcode Fuzzy Hash: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                          • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                            • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                            • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                            • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                            • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                          • CredEnumerateW.SECHOST(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                          • wcslen.MSVCRT ref: 0040BE06
                          • _wcsncoll.MSVCRT ref: 0040BE38
                          • memset.MSVCRT ref: 0040BE91
                          • memcpy.MSVCRT ref: 0040BEB2
                          • _wcsnicmp.MSVCRT ref: 0040BEFC
                          • wcschr.MSVCRT ref: 0040BF24
                          • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: AddressProc$CredEnumerateFreeLocal_wcsncoll_wcsnicmpmemcpymemsetwcschrwcslen
                          • String ID:
                          • API String ID: 3191383707-0
                          • Opcode ID: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                          • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                          • Opcode Fuzzy Hash: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                          • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memset.MSVCRT ref: 00403CBF
                          • memset.MSVCRT ref: 00403CD4
                          • memset.MSVCRT ref: 00403CE9
                          • memset.MSVCRT ref: 00403CFE
                          • memset.MSVCRT ref: 00403D13
                            • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                            • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                            • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                            • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                            • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                          • memset.MSVCRT ref: 00403DDA
                            • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                            • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                          • String ID: Waterfox$Waterfox\Profiles
                          • API String ID: 4039892925-11920434
                          • Opcode ID: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                          • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                          • Opcode Fuzzy Hash: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                          • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memset.MSVCRT ref: 00403E50
                          • memset.MSVCRT ref: 00403E65
                          • memset.MSVCRT ref: 00403E7A
                          • memset.MSVCRT ref: 00403E8F
                          • memset.MSVCRT ref: 00403EA4
                            • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                            • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                            • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                            • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                            • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                          • memset.MSVCRT ref: 00403F6B
                            • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                            • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                          • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                          • API String ID: 4039892925-2068335096
                          • Opcode ID: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                          • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                          • Opcode Fuzzy Hash: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                          • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memset.MSVCRT ref: 00403FE1
                          • memset.MSVCRT ref: 00403FF6
                          • memset.MSVCRT ref: 0040400B
                          • memset.MSVCRT ref: 00404020
                          • memset.MSVCRT ref: 00404035
                            • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                            • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                            • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                            • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                            • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                          • memset.MSVCRT ref: 004040FC
                            • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                            • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                          • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                          • API String ID: 4039892925-3369679110
                          • Opcode ID: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                          • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                          • Opcode Fuzzy Hash: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                          • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: memcpy
                          • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                          • API String ID: 3510742995-2641926074
                          • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                          • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                          • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                          • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 0040B633: ??3@YAXPAX@Z.MSVCRT ref: 0040B63A
                            • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                            • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                          • memset.MSVCRT ref: 004033B7
                          • memcpy.MSVCRT ref: 004033D0
                          • wcscmp.MSVCRT ref: 004033FC
                          • _wcsicmp.MSVCRT ref: 00403439
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset$??3@_wcsicmpmemcpywcscmpwcsrchr
                          • String ID: $0.@
                          • API String ID: 3030842498-1896041820
                          • Opcode ID: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                          • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                          • Opcode Fuzzy Hash: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                          • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                            • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                            • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                            • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                            • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                          • String ID:
                          • API String ID: 2941347001-0
                          • Opcode ID: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                          • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                          • Opcode Fuzzy Hash: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                          • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memset.MSVCRT ref: 00403C09
                          • memset.MSVCRT ref: 00403C1E
                            • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                            • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                            • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                          • wcscat.MSVCRT ref: 00403C47
                            • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                            • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                            • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                          • wcscat.MSVCRT ref: 00403C70
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: memsetwcscat$CloseFolderPathSpecialwcscpywcslen
                          • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                          • API String ID: 1534475566-1174173950
                          • Opcode ID: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                          • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                          • Opcode Fuzzy Hash: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                          • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                          • SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                          • memset.MSVCRT ref: 00414C87
                          • RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                          • wcscpy.MSVCRT ref: 00414CFC
                            • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                          Strings
                          • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: AddressCloseFolderPathProcSpecialVersionmemsetwcscpy
                          • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                          • API String ID: 71295984-2036018995
                          • Opcode ID: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                          • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                          • Opcode Fuzzy Hash: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                          • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • wcschr.MSVCRT ref: 00414458
                          • _snwprintf.MSVCRT ref: 0041447D
                          • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                          • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: PrivateProfileString$Write_snwprintfwcschr
                          • String ID: "%s"
                          • API String ID: 1343145685-3297466227
                          • Opcode ID: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                          • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                          • Opcode Fuzzy Hash: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                          • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                          • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                          • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: AddressHandleModuleProcProcessTimes
                          • String ID: GetProcessTimes$kernel32.dll
                          • API String ID: 1714573020-3385500049
                          • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                          • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                          • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                          • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: memcmp
                          • String ID: @ $SQLite format 3
                          • API String ID: 1475443563-3708268960
                          • Opcode ID: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                          • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                          • Opcode Fuzzy Hash: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                          • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: _wcsicmpqsort
                          • String ID: /nosort$/sort
                          • API String ID: 1579243037-1578091866
                          • Opcode ID: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                          • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                          • Opcode Fuzzy Hash: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                          • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memset.MSVCRT ref: 0040E60F
                          • memset.MSVCRT ref: 0040E629
                            • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                            • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                          Strings
                          • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                          • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: memsetwcslen$AttributesFileFolderPathSpecialwcscatwcscpy
                          • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                          • API String ID: 2887208581-2114579845
                          • Opcode ID: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                          • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                          • Opcode Fuzzy Hash: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                          • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                          • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                          • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                          • LockResource.KERNEL32(00000000), ref: 004148EF
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: Resource$FindLoadLockSizeof
                          • String ID:
                          • API String ID: 3473537107-0
                          • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                          • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                          • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                          • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??3@
                          • String ID:
                          • API String ID: 613200358-0
                          • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                          • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                          • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                          • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset
                          • String ID: only a single result allowed for a SELECT that is part of an expression
                          • API String ID: 2221118986-1725073988
                          • Opcode ID: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                          • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                          • Opcode Fuzzy Hash: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                          • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • Sleep.KERNEL32(00000064), ref: 004175D0
                          • FindCloseChangeNotification.KERNELBASE(?,00000000,00000000,0045DBC0,00417C24,00000008,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: ChangeCloseFindNotificationSleep
                          • String ID: }A
                          • API String ID: 1821831730-2138825249
                          • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                          • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                          • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                          • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??2@
                          • String ID:
                          • API String ID: 1033339047-0
                          • Opcode ID: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                          • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                          • Opcode Fuzzy Hash: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                          • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                            • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                            • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                            • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                            • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                            • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                            • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                          • memcmp.MSVCRT ref: 00444BA5
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: AddressProc$memcmp
                          • String ID: $$8
                          • API String ID: 2808797137-435121686
                          • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                          • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                          • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                          • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          • duplicate column name: %s, xrefs: 004307FE
                          • too many columns on %s, xrefs: 00430763
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: duplicate column name: %s$too many columns on %s
                          • API String ID: 0-1445880494
                          • Opcode ID: 2926fa06368f5232b18cfbe9a067055150ad8579ce0375914d7c8593e780dd9c
                          • Instruction ID: 332525b9e829d337f3b342900587a6bcab00951879d739311f42b30c77ca79e1
                          • Opcode Fuzzy Hash: 2926fa06368f5232b18cfbe9a067055150ad8579ce0375914d7c8593e780dd9c
                          • Instruction Fuzzy Hash: 5E314735500705AFCB109F55C891ABEB7B5EF88318F24815BE8969B342C738F841CB99
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                            • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                            • Part of subcall function 0040E01E: DuplicateHandle.KERNEL32(?,00000104,00000000), ref: 0040E0BF
                            • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                            • Part of subcall function 0040E01E: CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                            • Part of subcall function 0040E01E: MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                            • Part of subcall function 0040E01E: WriteFile.KERNEL32(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                            • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                            • Part of subcall function 0040E01E: CloseHandle.KERNEL32(?), ref: 0040E13E
                          • CloseHandle.KERNEL32(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                            • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                            • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                            • Part of subcall function 0040E2AB: memcpy.MSVCRT ref: 0040E3EC
                          • DeleteFileW.KERNEL32(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                          • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                            • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                            • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                            • Part of subcall function 0040E175: ??3@YAXPAX@Z.MSVCRT ref: 0040E28B
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: File$Handle$Close$ProcessViewmemset$??3@CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintfmemcpywcschr
                          • String ID:
                          • API String ID: 2722907921-0
                          • Opcode ID: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                          • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                          • Opcode Fuzzy Hash: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                          • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                            • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                            • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                            • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                          • memset.MSVCRT ref: 00403A55
                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                            • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                            • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                            • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                            • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                            • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: memsetwcscatwcslen$??3@$AttributesFilememcpywcscpy
                          • String ID: history.dat$places.sqlite
                          • API String ID: 3093078384-467022611
                          • Opcode ID: 7e5fa77ffbd80df454c8f06c208cb8abd3a99e536342b00205f9bee392087e79
                          • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                          • Opcode Fuzzy Hash: 7e5fa77ffbd80df454c8f06c208cb8abd3a99e536342b00205f9bee392087e79
                          • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 0040B1D1: wcslen.MSVCRT ref: 0040B1DE
                            • Part of subcall function 0040B1D1: ??3@YAXPAX@Z.MSVCRT ref: 0040B201
                            • Part of subcall function 0040B1D1: ??3@YAXPAX@Z.MSVCRT ref: 0040B224
                            • Part of subcall function 0040B1D1: memcpy.MSVCRT ref: 0040B248
                          • memset.MSVCRT ref: 0040B32F
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,0040B432,000000FF,?,00000FFF,00000000,00000000,0040B432,00000000,-00000002,0040B626,00000000), ref: 0040B348
                            • Part of subcall function 0040B0D1: strlen.MSVCRT ref: 0040B0D8
                            • Part of subcall function 0040B0D1: ??3@YAXPAX@Z.MSVCRT ref: 0040B0FB
                            • Part of subcall function 0040B0D1: ??3@YAXPAX@Z.MSVCRT ref: 0040B12C
                            • Part of subcall function 0040B0D1: memcpy.MSVCRT ref: 0040B159
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040B36F
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??3@$memcpy$ByteCharMultiWidememsetstrlenwcslen
                          • String ID:
                          • API String ID: 1562205978-0
                          • Opcode ID: 134a2a20f227110521b821ab2c1100a9462315ed21c6d5f86104d5526ebf48b7
                          • Instruction ID: b857a4007f161fa5246434627f102fbdc01d58e76d807d6b79cc7eff8a49146b
                          • Opcode Fuzzy Hash: 134a2a20f227110521b821ab2c1100a9462315ed21c6d5f86104d5526ebf48b7
                          • Instruction Fuzzy Hash: 18212771900218BFDB009B98EC44C9A37ACEB46329F10823BFC45A7292D7B8DD549B5D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                            • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                            • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                          • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                          • GetLastError.KERNEL32 ref: 00417627
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorLast$File$PointerRead
                          • String ID:
                          • API String ID: 839530781-0
                          • Opcode ID: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                          • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                          • Opcode Fuzzy Hash: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                          • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset
                          • String ID:
                          • API String ID: 2221118986-0
                          • Opcode ID: aa4d0402c51c5d0a187992cb920f5d60b2687b534395d06311f142e6e57fc3d2
                          • Instruction ID: ab827e58211017b50a374ecff23b92c7d33c5c2594aefa3e9ea54b4f7b6580b8
                          • Opcode Fuzzy Hash: aa4d0402c51c5d0a187992cb920f5d60b2687b534395d06311f142e6e57fc3d2
                          • Instruction Fuzzy Hash: 6A0167B3904308AAFB24D791DD8AB9A73ACDB14714F5100BBA704E21C3EBBC9B45865D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: FileFindFirst
                          • String ID: *.*$index.dat
                          • API String ID: 1974802433-2863569691
                          • Opcode ID: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                          • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                          • Opcode Fuzzy Hash: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                          • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??3@mallocmemcpy
                          • String ID:
                          • API String ID: 3831604043-0
                          • Opcode ID: a85243c3274abcf257bc8a1d0c36c9fb31ec9b9764bc30e3ac6d524e65cdc455
                          • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                          • Opcode Fuzzy Hash: a85243c3274abcf257bc8a1d0c36c9fb31ec9b9764bc30e3ac6d524e65cdc455
                          • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                          • GetLastError.KERNEL32 ref: 004175A2
                          • GetLastError.KERNEL32 ref: 004175A8
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorLast$FilePointer
                          • String ID:
                          • API String ID: 1156039329-0
                          • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                          • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                          • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                          • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: d
                          • API String ID: 0-2564639436
                          • Opcode ID: 8b82e4f5ef2bc7d58288eb7d352e73fde76eaac7bad66d9443978647085fe40b
                          • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                          • Opcode Fuzzy Hash: 8b82e4f5ef2bc7d58288eb7d352e73fde76eaac7bad66d9443978647085fe40b
                          • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset
                          • String ID: BINARY
                          • API String ID: 2221118986-907554435
                          • Opcode ID: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                          • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                          • Opcode Fuzzy Hash: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                          • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT ref: 0040ECF9
                            • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT ref: 0040EDC0
                          • GetStdHandle.KERNEL32(000000F5), ref: 00410530
                          • FindCloseChangeNotification.KERNELBASE(?), ref: 00410654
                            • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                            • Part of subcall function 0040973C: GetLastError.KERNEL32 ref: 00409750
                            • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                            • Part of subcall function 0040973C: MessageBoxW.USER32(?,?,Error,00000030), ref: 00409796
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??2@??3@ChangeCloseCreateErrorFileFindHandleLastMessageNotification_snwprintf
                          • String ID:
                          • API String ID: 1161345128-0
                          • Opcode ID: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                          • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                          • Opcode Fuzzy Hash: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                          • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: _wcsicmp
                          • String ID: /stext
                          • API String ID: 2081463915-3817206916
                          • Opcode ID: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                          • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                          • Opcode Fuzzy Hash: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                          • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                          • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                            • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                            • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                            • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                            • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                          • FindCloseChangeNotification.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                            • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT ref: 0040B052
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: File$ByteCharMultiWide$??2@??3@ChangeCloseCreateFindNotificationReadSize
                          • String ID:
                          • API String ID: 159017214-0
                          • Opcode ID: 0747cffe0d4318b549639fe65d261b33fbf2e1cc55d84b58f56d9b154b80ed33
                          • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                          • Opcode Fuzzy Hash: 0747cffe0d4318b549639fe65d261b33fbf2e1cc55d84b58f56d9b154b80ed33
                          • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memset.MSVCRT ref: 0041898C
                          • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: InfoSystemmemset
                          • String ID:
                          • API String ID: 3558857096-0
                          • Opcode ID: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                          • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                          • Opcode Fuzzy Hash: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                          • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          • failed to allocate %u bytes of memory, xrefs: 004152F0
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: malloc
                          • String ID: failed to allocate %u bytes of memory
                          • API String ID: 2803490479-1168259600
                          • Opcode ID: 331d9f3b8e40439b36498a1be208f9c7b855b07c1663acfa81ecf9407a5950a4
                          • Instruction ID: 0aa28a7b77b2060330bf56ee6aba3953d7f003d38adef6953018dc3bb0cf108c
                          • Opcode Fuzzy Hash: 331d9f3b8e40439b36498a1be208f9c7b855b07c1663acfa81ecf9407a5950a4
                          • Instruction Fuzzy Hash: 0FE026B7F01A12A3C200561AFD01AC677919FC132572B013BF92CD36C1E638D896C7A9
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??3@
                          • String ID:
                          • API String ID: 613200358-0
                          • Opcode ID: 4a6bf56a3c8e18f25b9487746213253c86c510b1b99403974ad2cc9a69351a87
                          • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                          • Opcode Fuzzy Hash: 4a6bf56a3c8e18f25b9487746213253c86c510b1b99403974ad2cc9a69351a87
                          • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??3@
                          • String ID:
                          • API String ID: 613200358-0
                          • Opcode ID: 536c2047bffc8dd9b34700d623eb618271f55ea3451f57cc7c37cab4f8277461
                          • Instruction ID: 93a37c1a4f050773dc1a5674df64ec50811fc8a39a1cc3e4a9db11821b00e242
                          • Opcode Fuzzy Hash: 536c2047bffc8dd9b34700d623eb618271f55ea3451f57cc7c37cab4f8277461
                          • Instruction Fuzzy Hash: A0B012310281004DEB057BA1B8061142302C64332E3B3413FE000500A3DE5D6034140F
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: memcmpmemset
                          • String ID:
                          • API String ID: 1065087418-0
                          • Opcode ID: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                          • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                          • Opcode Fuzzy Hash: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                          • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset
                          • String ID:
                          • API String ID: 2221118986-0
                          • Opcode ID: 1314b8a525b96e130b2fbb6cbe3c7ee378288528e928e0e3fe9c348834c14d1c
                          • Instruction ID: 1d54aaebfbdefc3985b5f7374fea00c82d73a4224d5df9dcd637b0600b3a95b1
                          • Opcode Fuzzy Hash: 1314b8a525b96e130b2fbb6cbe3c7ee378288528e928e0e3fe9c348834c14d1c
                          • Instruction Fuzzy Hash: B2415872500701EFDB349F60E8848AAB7F5FB18314720492FE54AC7690EB38E9C58B98
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                            • Part of subcall function 0040A02C: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                            • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                            • Part of subcall function 0040A02C: CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                          • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: File$Time$CloseCompareCreateHandlememset
                          • String ID:
                          • API String ID: 2154303073-0
                          • Opcode ID: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                          • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                          • Opcode Fuzzy Hash: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                          • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                            • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                            • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                            • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                            • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                            • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                          • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                          • String ID:
                          • API String ID: 3150196962-0
                          • Opcode ID: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                          • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                          • Opcode Fuzzy Hash: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                          • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                            • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                            • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                            • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: PrivateProfile$StringWrite_itowmemset
                          • String ID:
                          • API String ID: 4232544981-0
                          • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                          • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                          • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                          • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: FreeLibrary
                          • String ID:
                          • API String ID: 3664257935-0
                          • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                          • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                          • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                          • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                            • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                            • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                            • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                            • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                          • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: AddressProc$FileModuleName
                          • String ID:
                          • API String ID: 3859505661-0
                          • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                          • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                          • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                          • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: FreeLibrary
                          • String ID:
                          • API String ID: 3664257935-0
                          • Opcode ID: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                          • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                          • Opcode Fuzzy Hash: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                          • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: FileRead
                          • String ID:
                          • API String ID: 2738559852-0
                          • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                          • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                          • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                          • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • WriteFile.KERNELBASE(?,00000009,?,00000000,00000000,?,?,00402F9B,?,00000000,00000000,00000000,0000017E), ref: 0040A325
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: FileWrite
                          • String ID:
                          • API String ID: 3934441357-0
                          • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                          • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                          • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                          • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??3@
                          • String ID:
                          • API String ID: 613200358-0
                          • Opcode ID: 0d059ad067989d1f17bbe0e8521da585270b5c486309d81f35087ee814750848
                          • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                          • Opcode Fuzzy Hash: 0d059ad067989d1f17bbe0e8521da585270b5c486309d81f35087ee814750848
                          • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??3@
                          • String ID:
                          • API String ID: 613200358-0
                          • Opcode ID: 708d35572adfbd8c0afef1fefac48864b5998db401338d2add0cc9d49b5fd8aa
                          • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                          • Opcode Fuzzy Hash: 708d35572adfbd8c0afef1fefac48864b5998db401338d2add0cc9d49b5fd8aa
                          • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: CreateFile
                          • String ID:
                          • API String ID: 823142352-0
                          • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                          • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                          • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                          • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: CreateFile
                          • String ID:
                          • API String ID: 823142352-0
                          • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                          • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                          • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                          • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??3@
                          • String ID:
                          • API String ID: 613200358-0
                          • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                          • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                          • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                          • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • EnumResourceNamesW.KERNELBASE(?,?,Function_000148B6,00000000), ref: 0041494B
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: EnumNamesResource
                          • String ID:
                          • API String ID: 3334572018-0
                          • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                          • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                          • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                          • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: FreeLibrary
                          • String ID:
                          • API String ID: 3664257935-0
                          • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                          • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                          • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                          • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • FreeLibrary.KERNELBASE(00000000), ref: 0044DEB6
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: FreeLibrary
                          • String ID:
                          • API String ID: 3664257935-0
                          • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                          • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                          • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                          • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: CloseFind
                          • String ID:
                          • API String ID: 1863332320-0
                          • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                          • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                          • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                          • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: Open
                          • String ID:
                          • API String ID: 71445658-0
                          • Opcode ID: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                          • Instruction ID: 4e31294bd56c0fd8f54a78566f459ab053e1b17b284f5820c9a90ca28514d216
                          • Opcode Fuzzy Hash: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                          • Instruction Fuzzy Hash: C4C09B35544311BFDE114F40FD09F09BB61BB84B05F004414B254640B182714414EB17
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: AttributesFile
                          • String ID:
                          • API String ID: 3188754299-0
                          • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                          • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                          • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                          • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??3@
                          • String ID:
                          • API String ID: 613200358-0
                          • Opcode ID: f87c29ce762407ddd0adaed4fac3176b7b3a7b6aeb3172bf8294812ce0be7fe2
                          • Instruction ID: 5e082493cfe38c59748d9de5a46a99a47989c0e105afa31b953e1adb18ef7a34
                          • Opcode Fuzzy Hash: f87c29ce762407ddd0adaed4fac3176b7b3a7b6aeb3172bf8294812ce0be7fe2
                          • Instruction Fuzzy Hash: 17900282455501105C0425755C06505110808A313A376074A7032955D1CE188060601D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f464ccbab3ddc34ea334660331f976908ef01721c951a33d0f0b075526a08e67
                          • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                          • Opcode Fuzzy Hash: f464ccbab3ddc34ea334660331f976908ef01721c951a33d0f0b075526a08e67
                          • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memset.MSVCRT ref: 00445426
                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                            • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                            • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                            • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                            • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                            • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                            • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                          • String ID:
                          • API String ID: 1828521557-0
                          • Opcode ID: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                          • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                          • Opcode Fuzzy Hash: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                          • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT ref: 0040B052
                          • ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??2@??3@
                          • String ID:
                          • API String ID: 1936579350-0
                          • Opcode ID: d9146978952df4032bb52ee1fc914549b8afd9994305f4c2f79ca13836f6df5d
                          • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                          • Opcode Fuzzy Hash: d9146978952df4032bb52ee1fc914549b8afd9994305f4c2f79ca13836f6df5d
                          • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Non-executed Functions

                          APIs
                          • LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                          • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                          • FreeLibrary.KERNEL32(00000000), ref: 004044E9
                          • 7078DB20.COMCTL32 ref: 004044F7
                          • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: Library$7078AddressFreeLoadMessageProc
                          • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                          • API String ID: 2661263322-317687271
                          • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                          • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                          • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                          • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetLastError.KERNEL32 ref: 004182D7
                            • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                          • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                          • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                          • LocalFree.KERNEL32(?), ref: 00418342
                          • ??3@YAXPAX@Z.MSVCRT ref: 00418370
                            • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,74B05970,?,0041755F,?), ref: 00417452
                            • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: FormatMessage$??3@ByteCharErrorFreeLastLocalMultiVersionWidemalloc
                          • String ID: OsError 0x%x (%u)
                          • API String ID: 403622227-2664311388
                          • Opcode ID: d5c6fe0526594b2b514a1ddbfaf48a72c8b645ad5f50ee8d851b871b7e219225
                          • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                          • Opcode Fuzzy Hash: d5c6fe0526594b2b514a1ddbfaf48a72c8b645ad5f50ee8d851b871b7e219225
                          • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetVersionExW.KERNEL32(?), ref: 004173BE
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: Version
                          • String ID:
                          • API String ID: 1889659487-0
                          • Opcode ID: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                          • Instruction ID: 34334e4c1a53cba42546035453d5331cf18162d9798f59f763323439a3546438
                          • Opcode Fuzzy Hash: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                          • Instruction Fuzzy Hash: BAE0463590131CCFEB24DB34DB0B7C676F5AB08B46F0104F4C20AC2092D3789688CA2A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • _wcsicmp.MSVCRT ref: 004022A6
                          • _wcsicmp.MSVCRT ref: 004022D7
                          • _wcsicmp.MSVCRT ref: 00402305
                          • _wcsicmp.MSVCRT ref: 00402333
                            • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                            • Part of subcall function 0040AA29: memcpy.MSVCRT ref: 0040AA5B
                          • memset.MSVCRT ref: 0040265F
                          • memcpy.MSVCRT ref: 0040269B
                            • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                            • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                            • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                          • memcpy.MSVCRT ref: 004026FF
                          • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                          • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: _wcsicmp$Freememcpy$Library$AddressCryptDataLocalProcUnprotectmemsetwcslen
                          • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                          • API String ID: 2929817778-1134094380
                          • Opcode ID: 9397f4940cefbe0ceec442a857739dd93941f810d0ac8ce2dbc103f0b42f9f84
                          • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                          • Opcode Fuzzy Hash: 9397f4940cefbe0ceec442a857739dd93941f810d0ac8ce2dbc103f0b42f9f84
                          • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                          • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                          • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                          • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                          • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                          • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                          • GetWindowRect.USER32(00000000,?), ref: 0041407D
                          • GetWindowRect.USER32(?,?), ref: 00414088
                          • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                          • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                          • GetDC.USER32 ref: 004140E3
                          • wcslen.MSVCRT ref: 00414123
                          • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                          • ReleaseDC.USER32(?,?), ref: 00414181
                          • _snwprintf.MSVCRT ref: 00414244
                          • SetWindowTextW.USER32(?,?), ref: 00414258
                          • SetWindowTextW.USER32(?,00000000), ref: 00414276
                          • GetDlgItem.USER32(?,00000001), ref: 004142AC
                          • GetWindowRect.USER32(00000000,?), ref: 004142BC
                          • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                          • GetClientRect.USER32(?,?), ref: 004142E1
                          • GetWindowRect.USER32(?,?), ref: 004142EB
                          • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                          • GetClientRect.USER32(?,?), ref: 0041433B
                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                          • String ID: %s:$EDIT$STATIC
                          • API String ID: 2080319088-3046471546
                          • Opcode ID: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                          • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                          • Opcode Fuzzy Hash: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                          • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • EndDialog.USER32(?,?), ref: 00413221
                          • GetDlgItem.USER32(?,000003EA), ref: 00413239
                          • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                          • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                          • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                          • memset.MSVCRT ref: 00413292
                          • memset.MSVCRT ref: 004132B4
                          • memset.MSVCRT ref: 004132CD
                          • memset.MSVCRT ref: 004132E1
                          • memset.MSVCRT ref: 004132FB
                          • memset.MSVCRT ref: 00413310
                          • GetCurrentProcess.KERNEL32 ref: 00413318
                          • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                          • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                          • memset.MSVCRT ref: 004133C0
                          • GetCurrentProcessId.KERNEL32 ref: 004133CE
                          • memcpy.MSVCRT ref: 004133FC
                          • wcscpy.MSVCRT ref: 0041341F
                          • _snwprintf.MSVCRT ref: 0041348E
                          • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                          • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                          • SetFocus.USER32(00000000), ref: 004134B7
                          Strings
                          • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                          • {Unknown}, xrefs: 004132A6
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                          • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                          • API String ID: 4111938811-1819279800
                          • Opcode ID: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                          • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                          • Opcode Fuzzy Hash: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                          • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                          • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                          • GetDlgItem.USER32(?,000003EE), ref: 00401238
                          • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                          • GetDlgItem.USER32(?,000003EC), ref: 00401273
                          • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                          • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                          • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                          • SetCursor.USER32(00000000,?,?), ref: 0040129E
                          • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                          • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                          • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                          • SetBkMode.GDI32(?,00000001), ref: 004012F2
                          • SetTextColor.GDI32(?,00C00000), ref: 00401300
                          • GetSysColorBrush.USER32(0000000F), ref: 00401308
                          • GetDlgItem.USER32(?,000003EE), ref: 00401329
                          • EndDialog.USER32(?,?), ref: 0040135E
                          • DeleteObject.GDI32(?), ref: 0040136A
                          • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                          • ShowWindow.USER32(00000000), ref: 00401398
                          • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                          • ShowWindow.USER32(00000000), ref: 004013A7
                          • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                          • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                          • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                          • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                          • String ID:
                          • API String ID: 829165378-0
                          • Opcode ID: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                          • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                          • Opcode Fuzzy Hash: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                          • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memset.MSVCRT ref: 00404172
                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                            • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                          • wcscpy.MSVCRT ref: 004041D6
                          • wcscpy.MSVCRT ref: 004041E7
                          • memset.MSVCRT ref: 00404200
                          • memset.MSVCRT ref: 00404215
                          • _snwprintf.MSVCRT ref: 0040422F
                          • wcscpy.MSVCRT ref: 00404242
                          • memset.MSVCRT ref: 0040426E
                          • memset.MSVCRT ref: 004042CD
                          • memset.MSVCRT ref: 004042E2
                          • _snwprintf.MSVCRT ref: 004042FE
                          • wcscpy.MSVCRT ref: 00404311
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                          • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                          • API String ID: 2454223109-1580313836
                          • Opcode ID: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                          • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                          • Opcode Fuzzy Hash: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                          • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                          • SetMenu.USER32(?,00000000), ref: 00411453
                          • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                          • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                          • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                          • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                          • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                          • memcpy.MSVCRT ref: 004115C8
                          • ShowWindow.USER32(?,?), ref: 004115FE
                          • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                          • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                          • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                          • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                          • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                            • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                            • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                          • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                          • API String ID: 4054529287-3175352466
                          • Opcode ID: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                          • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                          • Opcode Fuzzy Hash: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                          • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                          • GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                          • GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                          • GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                          • GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                          • GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                          • GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                          • GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                          • GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: AddressProc$HandleModule
                          • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll
                          • API String ID: 667068680-2887671607
                          • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                          • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                          • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                          • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: _snwprintf$memset$wcscpy
                          • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                          • API String ID: 2000436516-3842416460
                          • Opcode ID: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                          • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                          • Opcode Fuzzy Hash: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                          • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                            • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040E49A
                            • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                          • memset.MSVCRT ref: 0040E380
                            • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                            • Part of subcall function 0040AA29: memcpy.MSVCRT ref: 0040AA5B
                          • wcschr.MSVCRT ref: 0040E3B8
                          • memcpy.MSVCRT ref: 0040E3EC
                          • memcpy.MSVCRT ref: 0040E407
                          • memcpy.MSVCRT ref: 0040E422
                          • memcpy.MSVCRT ref: 0040E43D
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: memcpy$_wcsicmpmemset$??3@wcschrwcslen
                          • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                          • API String ID: 3073804840-2252543386
                          • Opcode ID: 096520a674a6bab575df5dbc744d04c4fa5616f7e231fb41ab5d790b95b66fc2
                          • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                          • Opcode Fuzzy Hash: 096520a674a6bab575df5dbc744d04c4fa5616f7e231fb41ab5d790b95b66fc2
                          • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: memcpy$memcmp$ByteCharMultiWidememset
                          • String ID:
                          • API String ID: 3715365532-3916222277
                          • Opcode ID: a80c2ed2cd7725c5ba05b8bc3cd527f2b50e73a4ba521d2eda8c640b4e065994
                          • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                          • Opcode Fuzzy Hash: a80c2ed2cd7725c5ba05b8bc3cd527f2b50e73a4ba521d2eda8c640b4e065994
                          • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                          • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                          • ??2@YAPAXI@Z.MSVCRT ref: 0040859D
                            • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                          • memset.MSVCRT ref: 004085CF
                          • memset.MSVCRT ref: 004085F1
                          • memset.MSVCRT ref: 00408606
                          • strcmp.MSVCRT ref: 00408645
                          • _mbscpy.MSVCRT ref: 004086DB
                          • _mbscpy.MSVCRT ref: 004086FA
                          • memset.MSVCRT ref: 0040870E
                          • strcmp.MSVCRT ref: 0040876B
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040879D
                          • CloseHandle.KERNEL32(?,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 004087A6
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                          • String ID: ---
                          • API String ID: 3437578500-2854292027
                          • Opcode ID: d919f4b4b9c80681d9d452a18daf2ce47f670527832d52779cca48c80910e95f
                          • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                          • Opcode Fuzzy Hash: d919f4b4b9c80681d9d452a18daf2ce47f670527832d52779cca48c80910e95f
                          • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: _wcsicmp
                          • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                          • API String ID: 2081463915-1959339147
                          • Opcode ID: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                          • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                          • Opcode Fuzzy Hash: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                          • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetDC.USER32(00000000), ref: 004121FF
                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                          • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                          • SetBkMode.GDI32(?,00000001), ref: 00412232
                          • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                          • SelectObject.GDI32(?,?), ref: 00412251
                          • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                          • SelectObject.GDI32(00000014,00000005), ref: 00412291
                            • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                            • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                            • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                          • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                          • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                          • SetCursor.USER32(00000000), ref: 004122BC
                          • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                          • memcpy.MSVCRT ref: 0041234D
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                          • String ID:
                          • API String ID: 1700100422-0
                          • Opcode ID: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                          • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                          • Opcode Fuzzy Hash: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                          • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetClientRect.USER32(?,?), ref: 004111E0
                          • GetWindowRect.USER32(?,?), ref: 004111F6
                          • GetWindowRect.USER32(?,?), ref: 0041120C
                          • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                          • GetWindowRect.USER32(00000000), ref: 0041124D
                          • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                          • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                          • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                          • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                          • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                          • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                          • EndDeferWindowPos.USER32(?), ref: 0041130B
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: Window$Defer$Rect$BeginClientItemPoints
                          • String ID:
                          • API String ID: 552707033-0
                          • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                          • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                          • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                          • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,?,?,0040C255,?,?,*.*,0040C2BF,00000000), ref: 0040C0A4
                            • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                          • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                            • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                            • Part of subcall function 0040BFF3: memcpy.MSVCRT ref: 0040C024
                          • memcpy.MSVCRT ref: 0040C11B
                          • strchr.MSVCRT ref: 0040C140
                          • strchr.MSVCRT ref: 0040C151
                          • _strlwr.MSVCRT ref: 0040C15F
                          • memset.MSVCRT ref: 0040C17A
                          • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: File$memcpystrchr$CloseCreateHandlePointerSize_memicmp_strlwrmemset
                          • String ID: 4$h
                          • API String ID: 4066021378-1856150674
                          • Opcode ID: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                          • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                          • Opcode Fuzzy Hash: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                          • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                          • KillTimer.USER32(?,00000041), ref: 004060D7
                          • KillTimer.USER32(?,00000041), ref: 004060E8
                          • GetTickCount.KERNEL32 ref: 0040610B
                          • GetParent.USER32(?), ref: 00406136
                          • SendMessageW.USER32(00000000), ref: 0040613D
                          • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                          • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                          • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                          • String ID: A
                          • API String ID: 2892645895-3554254475
                          • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                          • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                          • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                          • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                          • String ID: 0$6
                          • API String ID: 4066108131-3849865405
                          • Opcode ID: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                          • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                          • Opcode Fuzzy Hash: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                          • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memset.MSVCRT ref: 004082EF
                            • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                          • memset.MSVCRT ref: 00408362
                          • memset.MSVCRT ref: 00408377
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset$ByteCharMultiWide
                          • String ID:
                          • API String ID: 290601579-0
                          • Opcode ID: c60d666c950e1de6cba0954a24524a9e41ca0abebb320c38a87f7a6f74f5840a
                          • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                          • Opcode Fuzzy Hash: c60d666c950e1de6cba0954a24524a9e41ca0abebb320c38a87f7a6f74f5840a
                          • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                          • memset.MSVCRT ref: 0040E1BD
                            • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040E28B
                            • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                            • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                            • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                          • _snwprintf.MSVCRT ref: 0040E257
                            • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                            • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                            • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                            • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??3@$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                          • String ID: $ContainerId$Container_%I64d$Containers$Name
                          • API String ID: 3883404497-2982631422
                          • Opcode ID: b6600637a152ed979c2f4ee96e02f38a490db88e96d2a506738c93b3ed228158
                          • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                          • Opcode Fuzzy Hash: b6600637a152ed979c2f4ee96e02f38a490db88e96d2a506738c93b3ed228158
                          • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: memcpywcslen$_snwprintfmemset
                          • String ID: %s (%s)$YV@
                          • API String ID: 3979103747-598926743
                          • Opcode ID: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                          • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                          • Opcode Fuzzy Hash: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                          • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          • too many attached databases - max %d, xrefs: 0042F64D
                          • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                          • database %s is already in use, xrefs: 0042F6C5
                          • out of memory, xrefs: 0042F865
                          • unable to open database: %s, xrefs: 0042F84E
                          • database is already attached, xrefs: 0042F721
                          • cannot ATTACH database within transaction, xrefs: 0042F663
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: memcpymemset
                          • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                          • API String ID: 1297977491-2001300268
                          • Opcode ID: 7e4b554c6cf2a7725b65294c40743cfb8927ad1f348c936232134d76ba50cb5c
                          • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                          • Opcode Fuzzy Hash: 7e4b554c6cf2a7725b65294c40743cfb8927ad1f348c936232134d76ba50cb5c
                          • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • DeleteFileW.KERNEL32(00000000,00000000,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 00418548
                          • GetFileAttributesW.KERNEL32(00000000), ref: 0041854F
                          • GetLastError.KERNEL32 ref: 0041855C
                          • Sleep.KERNEL32(00000064), ref: 00418571
                          • DeleteFileA.KERNEL32(00000000,00000000,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 0041857A
                          • GetFileAttributesA.KERNEL32(00000000), ref: 00418581
                          • GetLastError.KERNEL32 ref: 0041858E
                          • Sleep.KERNEL32(00000064), ref: 004185A3
                          • ??3@YAXPAX@Z.MSVCRT ref: 004185AC
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: File$AttributesDeleteErrorLastSleep$??3@
                          • String ID:
                          • API String ID: 3467550082-0
                          • Opcode ID: 56e4a7d77988e94444627618330347d92b7c0f18510b370ca22fa361cd1098af
                          • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                          • Opcode Fuzzy Hash: 56e4a7d77988e94444627618330347d92b7c0f18510b370ca22fa361cd1098af
                          • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                          • wcscpy.MSVCRT ref: 0040D1B5
                            • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                            • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                          • wcslen.MSVCRT ref: 0040D1D3
                          • GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                          • LoadStringW.USER32(00000000,?,00000FFF), ref: 0040D20C
                          • memcpy.MSVCRT ref: 0040D24C
                            • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D0CC
                            • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D0EA
                            • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D108
                            • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D126
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                          • String ID: strings
                          • API String ID: 3166385802-3030018805
                          • Opcode ID: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                          • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                          • Opcode Fuzzy Hash: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                          • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                          • memset.MSVCRT ref: 00405455
                          • memset.MSVCRT ref: 0040546C
                          • memset.MSVCRT ref: 00405483
                          • memcpy.MSVCRT ref: 00405498
                          • memcpy.MSVCRT ref: 004054AD
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset$memcpy$ErrorLast
                          • String ID: 6$\
                          • API String ID: 404372293-1284684873
                          • Opcode ID: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                          • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                          • Opcode Fuzzy Hash: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                          • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                          • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                          • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                          • wcscpy.MSVCRT ref: 0040A0D9
                          • wcscat.MSVCRT ref: 0040A0E6
                          • wcscat.MSVCRT ref: 0040A0F5
                          • wcscpy.MSVCRT ref: 0040A107
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                          • String ID:
                          • API String ID: 1331804452-0
                          • Opcode ID: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                          • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                          • Opcode Fuzzy Hash: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                          • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                            • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                            • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                            • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                            • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                            • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                          • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                          • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                          • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                          • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                          • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                          • String ID: advapi32.dll
                          • API String ID: 2012295524-4050573280
                          • Opcode ID: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                          • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                          • Opcode Fuzzy Hash: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                          • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          • <%s>, xrefs: 004100A6
                          • <?xml version="1.0" ?>, xrefs: 0041007C
                          • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset$_snwprintf
                          • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                          • API String ID: 3473751417-2880344631
                          • Opcode ID: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                          • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                          • Opcode Fuzzy Hash: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                          • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: wcscat$_snwprintfmemset
                          • String ID: %2.2X
                          • API String ID: 2521778956-791839006
                          • Opcode ID: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                          • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                          • Opcode Fuzzy Hash: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                          • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: _snwprintfwcscpy
                          • String ID: dialog_%d$general$menu_%d$strings
                          • API String ID: 999028693-502967061
                          • Opcode ID: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                          • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                          • Opcode Fuzzy Hash: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                          • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1AE
                            • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1B6
                            • Part of subcall function 00414592: RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                            • Part of subcall function 0040A9CE: ??3@YAXPAX@Z.MSVCRT ref: 0040A9DD
                          • memset.MSVCRT ref: 0040C439
                          • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                          • _wcsupr.MSVCRT ref: 0040C481
                            • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                            • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                            • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                            • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                          • memset.MSVCRT ref: 0040C4D0
                          • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                          • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,?), ref: 0040C508
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??3@$EnumValuememset$CloseOpen_wcsuprmemcpywcslen
                          • String ID:
                          • API String ID: 1973883786-0
                          • Opcode ID: 43de9e52db830488c7ebdb2928a6c49d702693ce72869a855233a6d80c0cc9be
                          • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                          • Opcode Fuzzy Hash: 43de9e52db830488c7ebdb2928a6c49d702693ce72869a855233a6d80c0cc9be
                          • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memset.MSVCRT ref: 004185FC
                          • GetFileAttributesExW.KERNEL32(00000000,00000000,?), ref: 0041860A
                          • ??3@YAXPAX@Z.MSVCRT ref: 00418650
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??3@AttributesFilememset
                          • String ID:
                          • API String ID: 776155459-0
                          • Opcode ID: 7a9323aad94e24d1be4080513bc7e6f3ed6a266ca59275ba5ce2a6d3a44692dd
                          • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                          • Opcode Fuzzy Hash: 7a9323aad94e24d1be4080513bc7e6f3ed6a266ca59275ba5ce2a6d3a44692dd
                          • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • AreFileApisANSI.KERNEL32 ref: 004174FC
                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                          • malloc.MSVCRT ref: 00417524
                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                          • ??3@YAXPAX@Z.MSVCRT ref: 00417544
                          • ??3@YAXPAX@Z.MSVCRT ref: 00417562
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??3@ByteCharMultiWide$ApisFilemalloc
                          • String ID:
                          • API String ID: 2308052813-0
                          • Opcode ID: 726b282c5ce891bd13be6d49280dde48b664c9abca31c80fca4e8053420f6cc1
                          • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                          • Opcode Fuzzy Hash: 726b282c5ce891bd13be6d49280dde48b664c9abca31c80fca4e8053420f6cc1
                          • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                          • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                          • ??3@YAXPAX@Z.MSVCRT ref: 0041822B
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: PathTemp$??3@
                          • String ID: %s\etilqs_$etilqs_
                          • API String ID: 1589464350-1420421710
                          • Opcode ID: e349944c00f8d49a0493748d5881d0d50fc5388be029f354eaf4c315693a2c66
                          • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                          • Opcode Fuzzy Hash: e349944c00f8d49a0493748d5881d0d50fc5388be029f354eaf4c315693a2c66
                          • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • AreFileApisANSI.KERNEL32 ref: 00417497
                          • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                          • malloc.MSVCRT ref: 004174BD
                          • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                          • ??3@YAXPAX@Z.MSVCRT ref: 004174E4
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: ByteCharMultiWide$??3@ApisFilemalloc
                          • String ID:
                          • API String ID: 2903831945-0
                          • Opcode ID: 57d3071dd2de7bbc8e1c08973dbf7d9290014f20ee3246d914a41c796bcca670
                          • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                          • Opcode Fuzzy Hash: 57d3071dd2de7bbc8e1c08973dbf7d9290014f20ee3246d914a41c796bcca670
                          • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetParent.USER32(?), ref: 0040D453
                          • GetWindowRect.USER32(?,?), ref: 0040D460
                          • GetClientRect.USER32(00000000,?), ref: 0040D46B
                          • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                          • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: Window$Rect$ClientParentPoints
                          • String ID:
                          • API String ID: 4247780290-0
                          • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                          • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                          • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                          • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                          • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                          • ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                          • memset.MSVCRT ref: 004450CD
                            • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                          • ??3@YAXPAX@Z.MSVCRT ref: 004450F0
                            • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                            • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F63
                            • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F75
                            • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F9D
                          • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                          • String ID:
                          • API String ID: 1471605966-0
                          • Opcode ID: fe89481ff80bd84e13eeeeff2698d9b4f5521197f7f9bdc644b3131c241efa7c
                          • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                          • Opcode Fuzzy Hash: fe89481ff80bd84e13eeeeff2698d9b4f5521197f7f9bdc644b3131c241efa7c
                          • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: memcpy$??3@
                          • String ID: g4@
                          • API String ID: 3314356048-2133833424
                          • Opcode ID: 5ca90841aa7ac27d251937f4286d5c28b71121c56bc89bd43d9446bd4e5208fe
                          • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                          • Opcode Fuzzy Hash: 5ca90841aa7ac27d251937f4286d5c28b71121c56bc89bd43d9446bd4e5208fe
                          • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memset.MSVCRT ref: 004100FB
                          • memset.MSVCRT ref: 00410112
                            • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                            • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                          • _snwprintf.MSVCRT ref: 00410141
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset$_snwprintf_wcslwrwcscpy
                          • String ID: </%s>
                          • API String ID: 3400436232-259020660
                          • Opcode ID: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                          • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                          • Opcode Fuzzy Hash: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                          • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memset.MSVCRT ref: 0040D58D
                          • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                          • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: ChildEnumTextWindowWindowsmemset
                          • String ID: caption
                          • API String ID: 1523050162-4135340389
                          • Opcode ID: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                          • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                          • Opcode Fuzzy Hash: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                          • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                            • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                          • CreateFontIndirectW.GDI32(?), ref: 00401156
                          • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                          • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                          • String ID: MS Sans Serif
                          • API String ID: 210187428-168460110
                          • Opcode ID: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                          • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                          • Opcode Fuzzy Hash: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                          • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memset.MSVCRT ref: 0040560C
                            • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                            • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,00000FFF), ref: 0040D20C
                            • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                            • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                            • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                            • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                            • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                            • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                            • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                            • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4D2
                            • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                            • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4F3
                            • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                          • String ID: *.*$dat$wand.dat
                          • API String ID: 2618321458-1828844352
                          • Opcode ID: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                          • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                          • Opcode Fuzzy Hash: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                          • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memset.MSVCRT ref: 00412057
                            • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,0044E518,0044E518,00000005), ref: 0040A12C
                          • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                          • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                          • GetKeyState.USER32(00000010), ref: 0041210D
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: ExecuteMenuMessageSendShellStateStringmemset
                          • String ID:
                          • API String ID: 3550944819-0
                          • Opcode ID: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                          • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                          • Opcode Fuzzy Hash: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                          • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • wcslen.MSVCRT ref: 0040B1DE
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040B201
                            • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                            • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                            • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040B224
                          • memcpy.MSVCRT ref: 0040B248
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??3@$memcpy$mallocwcslen
                          • String ID:
                          • API String ID: 3023356884-0
                          • Opcode ID: 265e11fb3b93f6842ac601c308daddd794573f9d2d057257d07b24b118d7ea2e
                          • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                          • Opcode Fuzzy Hash: 265e11fb3b93f6842ac601c308daddd794573f9d2d057257d07b24b118d7ea2e
                          • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • strlen.MSVCRT ref: 0040B0D8
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040B0FB
                            • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                            • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                            • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040B12C
                          • memcpy.MSVCRT ref: 0040B159
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??3@$memcpy$mallocstrlen
                          • String ID:
                          • API String ID: 1171893557-0
                          • Opcode ID: d8b96de248f7d7037f9e30158b7ab90977b72bd63dac2b37973b5005ce90d3f5
                          • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                          • Opcode Fuzzy Hash: d8b96de248f7d7037f9e30158b7ab90977b72bd63dac2b37973b5005ce90d3f5
                          • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memset.MSVCRT ref: 004144E7
                            • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                            • Part of subcall function 0040A353: memcpy.MSVCRT ref: 0040A3A8
                          • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                          • memset.MSVCRT ref: 0041451A
                          • GetPrivateProfileStringW.KERNEL32(?,?,0044E518,?,00002000,?), ref: 0041453C
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                          • String ID:
                          • API String ID: 1127616056-0
                          • Opcode ID: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                          • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                          • Opcode Fuzzy Hash: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                          • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,74B05970,?,0041755F,?), ref: 00417452
                          • malloc.MSVCRT ref: 00417459
                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,74B05970,?,0041755F,?), ref: 00417478
                          • ??3@YAXPAX@Z.MSVCRT ref: 0041747F
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: ByteCharMultiWide$??3@malloc
                          • String ID:
                          • API String ID: 4284152360-0
                          • Opcode ID: 35e3d96e4e8f16596d993fb63affbe7c511ca80ecd689a4fb8a2c9eba3d4a450
                          • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                          • Opcode Fuzzy Hash: 35e3d96e4e8f16596d993fb63affbe7c511ca80ecd689a4fb8a2c9eba3d4a450
                          • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetModuleHandleW.KERNEL32(00000000), ref: 00412403
                          • RegisterClassW.USER32(?), ref: 00412428
                          • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                          • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000), ref: 00412455
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: HandleModule$ClassCreateRegisterWindow
                          • String ID:
                          • API String ID: 2678498856-0
                          • Opcode ID: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                          • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                          • Opcode Fuzzy Hash: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                          • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                          • malloc.MSVCRT ref: 00417407
                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                          • ??3@YAXPAX@Z.MSVCRT ref: 00417425
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: ByteCharMultiWide$??3@malloc
                          • String ID:
                          • API String ID: 4284152360-0
                          • Opcode ID: a2ae8ec016122b8f6e3efdb0c2476e7f426d1c5b61e32c0c73e3f87cc7c6b3a1
                          • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                          • Opcode Fuzzy Hash: a2ae8ec016122b8f6e3efdb0c2476e7f426d1c5b61e32c0c73e3f87cc7c6b3a1
                          • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                            • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                            • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                          • SetBkMode.GDI32(?,00000001), ref: 004143A2
                          • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                          • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                          • GetStockObject.GDI32(00000000), ref: 004143C6
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                          • String ID:
                          • API String ID: 764393265-0
                          • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                          • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                          • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                          • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memcpy.MSVCRT ref: 004134E0
                          • memcpy.MSVCRT ref: 004134F2
                          • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                          • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: memcpy$DialogHandleModuleParam
                          • String ID:
                          • API String ID: 1386444988-0
                          • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                          • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                          • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                          • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.288437970.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.288432662.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288486030.0000000000459000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288492117.000000000045D000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288497713.0000000000473000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288508614.000000000047C000.00000040.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288514715.000000000047E000.00000080.00020000.sdmp Download File
                          • Associated: 0000000F.00000002.288519687.000000000047F000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_A.jbxd
                          Yara matches
                          Similarity
                          • API ID: _snwprintfmemcpy
                          • String ID: %2.2X
                          • API String ID: 2789212964-323797159
                          • Opcode ID: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                          • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                          • Opcode Fuzzy Hash: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                          • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Execution Graph

                          Execution Coverage:2.5%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:0.5%
                          Total number of Nodes:834
                          Total number of Limit Nodes:18

                          Graph

                          execution_graph 33983 43ee43 59 API calls 33985 405e41 13 API calls 33796 429046 memset memset memcpy memset memset 33797 432447 17 API calls 33798 401445 memcpy memcpy DialogBoxParamA 33799 413848 strcmp 33800 41104f 16 API calls __fprintf_l 33802 411a2d 14 API calls 3 library calls 33990 424852 76 API calls __fprintf_l 33804 401455 ExitProcess GetWindowLongA SetWindowLongA 33991 432654 15 API calls __fprintf_l 33809 40b05a LoadIconA LoadIconA SendMessageA SendMessageA SendMessageA 33812 401060 38 API calls 32902 410663 EnumResourceNamesA 33814 40b865 8 API calls 33815 427867 15 API calls __fprintf_l 33994 425e13 87 API calls 33816 404469 22 API calls 33996 41466f 16 API calls 33819 425474 16 API calls __fprintf_l 33820 426474 memcpy memset memset memcpy 33998 42e27a 61 API calls __fprintf_l 34001 411201 RtlDeleteCriticalSection __fprintf_l 33823 444003 __dllonexit 34005 404207 modf 33825 410808 memset SHGetPathFromIDList SendMessageA 33826 42a80b 27 API calls __fprintf_l 34007 40420c 12 API calls 34011 409213 10 API calls 33829 411014 15 API calls __fprintf_l 34012 404217 26 API calls 34013 403a18 strlen WriteFile 33788 44401a 33791 443ff4 33788->33791 33790 444023 33792 444003 __dllonexit 33791->33792 33793 443ffd _onexit 33791->33793 33792->33790 33793->33792 33830 43f41d 17 API calls 33831 43f022 19 API calls 34016 408e21 7 API calls 34017 411222 RtlEnterCriticalSection 34020 43ee2d 112 API calls 34021 411231 RtlLeaveCriticalSection 34022 403632 21 API calls 34025 413e34 19 API calls 33840 427434 76 API calls 33841 423c3b 19 API calls 33845 405cc1 65 API calls 33847 424852 75 API calls __fprintf_l 34027 4092cb 15 API calls 34028 4442cf _exit _c_exit 33851 43ecc8 18 API calls 34029 408ed5 7 API calls 34031 405edc SetDlgItemTextA GetDlgItemTextA 33856 424852 79 API calls __fprintf_l 33857 424852 76 API calls __fprintf_l 34032 427645 42 API calls 33860 4338e6 15 API calls __fprintf_l 34034 43eae9 149 API calls 33862 4100ec 38 API calls 33864 426ced memset memset memcpy 34035 40c2ef 43 API calls 34036 40def0 9 API calls 34037 403af4 54 API calls 33869 43e8f9 122 API calls __fprintf_l 34038 4016fc NtdllDefWindowProc_A ??2@YAPAXI memset memcpy ??3@YAXPAX 34039 4336fd 17 API calls __fprintf_l 34040 403e83 34 API calls 34041 42968a 11 API calls 34042 40da89 42 API calls 33871 425e13 21 API calls 33873 43ec88 119 API calls 33874 426c8e 41 API calls 34043 433a8f 18 API calls 33876 409c8d _strcmpi 34045 44128b memcmp 34050 40aa94 7 API calls 34052 424852 111 API calls __fprintf_l 34053 43f698 21 API calls 34058 4276ad 47 API calls 34059 423ab3 18 API calls __fprintf_l 34061 43f2b7 17 API calls 33889 43f4ba 18 API calls 34062 424852 85 API calls __fprintf_l 34063 4442bb _XcptFilter 33894 444941 ??3@YAXPAX 33896 424852 77 API calls __fprintf_l 34064 43ef44 20 API calls 33897 42d14a 22 API calls 34065 404348 19 API calls 33898 40b94b 137 API calls 34067 424852 76 API calls __fprintf_l 34068 40c750 53 API calls 33901 414557 memset memset 33902 42523b 79 API calls __fprintf_l 33904 40ad58 29 API calls 33906 44315e 44 API calls 33907 41055b WritePrivateProfileStringA GetPrivateProfileStringA 34072 413f5c 18 API calls 34074 43f361 134 API calls 33911 440162 17 API calls 33912 444963 FreeLibrary 33913 429d69 memcpy __allrem 34075 40176b ExitProcess 34077 43eb6e 17 API calls 33915 437972 110 API calls __fprintf_l 33916 405972 39 API calls 34079 442f71 _mbscpy 33918 403577 20 API calls 33921 44497b ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 33924 444905 _onexit __dllonexit 33925 43ed07 20 API calls 32903 410507 32906 4103e0 32903->32906 32905 410527 32907 4103ec 32906->32907 32908 4103fe GetPrivateProfileIntA 32906->32908 32911 4102f8 memset _itoa WritePrivateProfileStringA 32907->32911 32908->32905 32910 4103f9 32910->32905 32911->32910 34081 415b07 memcpy memcpy memcpy memcpy 34082 40af07 8 API calls 33928 414d0c 22 API calls __fprintf_l 33929 433513 19 API calls __fprintf_l 34086 424852 83 API calls __fprintf_l 33933 40a117 memset sprintf SendMessageA 34087 40c319 117 API calls 34088 40b31a memset memset _mbsicmp 33935 410d1d 18 API calls 2 library calls 34092 441727 38 API calls 33937 433126 16 API calls __fprintf_l 34094 42732a 24 API calls 32912 44412e 32931 44431c 32912->32931 32914 44413a GetModuleHandleA 32917 44414c __set_app_type __p__fmode __p__commode 32914->32917 32916 4441de 32918 4441e6 __setusermatherr 32916->32918 32919 4441f2 32916->32919 32917->32916 32918->32919 32932 444306 _controlfp 32919->32932 32921 4441f7 _initterm __getmainargs _initterm 32922 44424e GetStartupInfoA 32921->32922 32924 444282 GetModuleHandleA 32922->32924 32933 40cc66 32924->32933 32928 4442b3 _cexit 32930 4442e8 32928->32930 32929 4442ac exit 32929->32928 32931->32914 32932->32921 32984 404a94 LoadLibraryA 32933->32984 32935 40cc82 32970 40cc86 32935->32970 32993 41067e 32935->32993 32937 40cc91 32997 40c9f7 ??2@YAPAXI 32937->32997 32939 40ccbd 33011 407a4b 32939->33011 32944 40cce6 33029 409596 memset 32944->33029 32945 40ccfa 33034 409465 memset 32945->33034 32950 407bbf _strcmpi 32954 40cd10 32950->32954 32951 40cea3 ??3@YAXPAX 32952 40cec1 DeleteObject 32951->32952 32953 40ced5 32951->32953 32952->32953 33058 4076d7 ??3@YAXPAX ??3@YAXPAX 32953->33058 32956 40cd14 RegDeleteKeyA 32954->32956 32957 40cd29 EnumResourceTypesA 32954->32957 32956->32951 32959 40cd51 MessageBoxA 32957->32959 32960 40cd69 32957->32960 32958 40cee6 33059 4045bd ??3@YAXPAX 32958->33059 32959->32951 32962 40cdc2 CoInitialize 32960->32962 33039 40cb90 32960->33039 33056 40c946 strncat memset RegisterClassA CreateWindowExA 32962->33056 32963 40ceef 33060 4076d7 ??3@YAXPAX ??3@YAXPAX 32963->33060 32966 40cdd3 ShowWindow UpdateWindow LoadAcceleratorsA 33057 40bfb1 PostMessageA 32966->33057 32970->32928 32970->32929 32971 40cdc0 32971->32962 32972 40cd83 ??3@YAXPAX 32972->32953 32974 40cda6 DeleteObject 32972->32974 32974->32953 32976 40ce1b GetMessageA 32977 40ce9d 32976->32977 32978 40ce2f 32976->32978 32977->32951 32979 40ce35 TranslateAccelerator 32978->32979 32981 40ce67 IsDialogMessage 32978->32981 32982 40ce5b IsDialogMessage 32978->32982 32979->32978 32980 40ce8f GetMessageA 32979->32980 32980->32977 32980->32979 32981->32980 32983 40ce79 TranslateMessage DispatchMessageA 32981->32983 32982->32980 32982->32981 32983->32980 32985 404ae7 7078DB20 32984->32985 32986 404abf GetProcAddress 32984->32986 32989 404af0 32985->32989 32987 404ad8 FreeLibrary 32986->32987 32988 404acf 32986->32988 32987->32985 32990 404ae3 32987->32990 32988->32987 32991 404af7 MessageBoxA 32989->32991 32992 404b0e 32989->32992 32990->32989 32991->32935 32992->32935 32994 410687 LoadLibraryA 32993->32994 32995 4106ac 32993->32995 32994->32995 32996 41069b GetProcAddress 32994->32996 32995->32937 32996->32995 32998 40ca28 ??2@YAPAXI 32997->32998 33000 40ca46 32998->33000 33001 40ca4d 32998->33001 33068 40400d 6 API calls 33000->33068 33003 40ca86 33001->33003 33004 40ca79 DeleteObject 33001->33004 33061 406e26 33003->33061 33004->33003 33006 40ca8b 33064 4019b4 33006->33064 33009 4019b4 strncat 33010 40cadf _mbscpy 33009->33010 33010->32939 33070 4076d7 ??3@YAXPAX ??3@YAXPAX 33011->33070 33013 407b93 33071 4077e4 33013->33071 33016 4077ae malloc memcpy ??3@YAXPAX ??3@YAXPAX 33023 407a86 33016->33023 33017 407b6b 33017->33013 33083 4077ae 33017->33083 33019 407b09 ??3@YAXPAX 33019->33023 33023->33013 33023->33016 33023->33017 33023->33019 33074 4076fd 7 API calls 33023->33074 33075 406cce 33023->33075 33025 407bbf 33026 407be6 33025->33026 33027 407bc7 33025->33027 33026->32944 33026->32945 33027->33026 33028 407bd0 _strcmpi 33027->33028 33028->33026 33028->33027 33089 409570 33029->33089 33031 4095c5 33094 4094a2 33031->33094 33035 409570 3 API calls 33034->33035 33036 409494 33035->33036 33114 4093dd 33036->33114 33128 4023a9 33039->33128 33045 40cbf4 33217 40cafa 7 API calls 33045->33217 33046 40cbef 33049 40cc60 33046->33049 33169 40c12b memset GetModuleFileNameA strrchr 33046->33169 33049->32971 33049->32972 33052 40cc0e 33196 40ad59 33052->33196 33056->32966 33057->32976 33058->32958 33059->32963 33060->32970 33069 406d65 memset _mbscpy 33061->33069 33063 406e3d CreateFontIndirectA 33063->33006 33065 4019e0 33064->33065 33066 4019c1 strncat 33065->33066 33067 4019e4 memset LoadIconA 33065->33067 33066->33065 33067->33009 33068->33001 33069->33063 33070->33023 33072 4077f4 33071->33072 33073 4077ea ??3@YAXPAX 33071->33073 33072->33025 33073->33072 33074->33023 33076 406cd5 malloc 33075->33076 33077 406d1b 33075->33077 33079 406d11 33076->33079 33080 406cf6 33076->33080 33077->33023 33079->33023 33081 406d0a ??3@YAXPAX 33080->33081 33082 406cfa memcpy 33080->33082 33081->33079 33082->33081 33084 4077c7 33083->33084 33085 4077bc ??3@YAXPAX 33083->33085 33087 406cce 3 API calls 33084->33087 33086 4077d2 33085->33086 33088 4076fd 7 API calls 33086->33088 33087->33086 33088->33013 33105 406d34 GetModuleFileNameA 33089->33105 33091 409576 strrchr 33092 409585 33091->33092 33093 409588 _mbscat 33091->33093 33092->33093 33093->33031 33106 4446d0 33094->33106 33099 40907d 3 API calls 33100 4094ea EnumResourceNamesA EnumResourceNamesA _mbscpy memset 33099->33100 33101 409536 LoadStringA 33100->33101 33104 40954c 33101->33104 33103 409564 33103->32951 33104->33101 33104->33103 33113 4090eb memset GetPrivateProfileStringA WritePrivateProfileStringA _itoa 33104->33113 33105->33091 33107 4094af _mbscpy _mbscpy 33106->33107 33108 40907d 33107->33108 33109 4446d0 33108->33109 33110 40908a memset GetPrivateProfileStringA 33109->33110 33111 4090e5 33110->33111 33112 4090d5 WritePrivateProfileStringA 33110->33112 33111->33099 33112->33111 33113->33104 33124 406d1f GetFileAttributesA 33114->33124 33116 4093e6 33117 40945f 33116->33117 33118 4093eb _mbscpy _mbscpy GetPrivateProfileIntA 33116->33118 33117->32950 33125 408fe9 GetPrivateProfileStringA 33118->33125 33120 40943a 33126 408fe9 GetPrivateProfileStringA 33120->33126 33122 40944b 33127 408fe9 GetPrivateProfileStringA 33122->33127 33124->33116 33125->33120 33126->33122 33127->33117 33219 409989 33128->33219 33131 401e60 memset 33258 41072b 33131->33258 33134 401eb9 33288 406e81 strlen _mbscat _mbscpy _mbscat 33134->33288 33135 401ecb 33273 406d1f GetFileAttributesA 33135->33273 33138 401edd strlen strlen 33140 401f1f 33138->33140 33141 401f0c 33138->33141 33274 406d1f GetFileAttributesA 33140->33274 33289 406e81 strlen _mbscat _mbscpy _mbscat 33141->33289 33144 401f2c 33275 401c30 33144->33275 33147 401f6c 33287 410411 RegOpenKeyExA 33147->33287 33148 401c30 7 API calls 33148->33147 33150 401f88 33151 401f93 memset 33150->33151 33152 40217e 33150->33152 33290 4104d7 RegEnumKeyExA 33151->33290 33154 40219f _strcmpi 33152->33154 33155 40218c ExpandEnvironmentStringsA 33152->33155 33154->33045 33154->33046 33299 406d1f GetFileAttributesA 33155->33299 33157 402175 RegCloseKey 33157->33152 33158 401fd0 atoi 33159 401fe6 memset memset sprintf 33158->33159 33167 401fc0 33158->33167 33291 410493 33159->33291 33162 40215c 33162->33157 33163 40206d memset memset strlen strlen 33163->33167 33164 406e81 strlen _mbscat _mbscpy _mbscat 33164->33167 33165 4020d4 strlen strlen 33165->33167 33166 406d1f GetFileAttributesA 33166->33167 33167->33157 33167->33158 33167->33162 33167->33163 33167->33164 33167->33165 33167->33166 33168 40215e _mbscpy 33167->33168 33298 4104d7 RegEnumKeyExA 33167->33298 33168->33157 33170 40c17b 33169->33170 33171 40c17e _mbscat _mbscpy _mbscpy 33169->33171 33170->33171 33172 40c1f6 33171->33172 33173 40c26b 33172->33173 33174 40c25b GetWindowPlacement 33172->33174 33175 40c291 33173->33175 33320 4017d1 GetSystemMetrics GetSystemMetrics SetWindowPos 33173->33320 33174->33173 33313 40989e 33175->33313 33179 40b783 33180 40b7e2 33179->33180 33186 40b797 33179->33186 33323 406a00 LoadCursorA SetCursor 33180->33323 33182 40b7e7 33324 410411 RegOpenKeyExA 33182->33324 33325 40472f 33182->33325 33333 404780 33182->33333 33336 403c03 33182->33336 33412 410166 33182->33412 33183 40b79e _mbsicmp 33183->33186 33184 40b7fb 33185 407bbf _strcmpi 33184->33185 33189 40b80b 33185->33189 33186->33180 33186->33183 33415 40b340 10 API calls 33186->33415 33187 40b855 SetCursor 33187->33052 33189->33187 33190 40b84c qsort 33189->33190 33190->33187 33197 40ad6d 33196->33197 33777 409b5a SendMessageA ??2@YAPAXI ??3@YAXPAX 33196->33777 33199 40ad75 33197->33199 33200 40ad7e GetStdHandle 33197->33200 33776 406ab8 CreateFileA 33199->33776 33201 40ad7b 33200->33201 33203 40ad94 33201->33203 33204 40ae8c 33201->33204 33778 406a00 LoadCursorA SetCursor 33203->33778 33782 406b15 8 API calls 33204->33782 33207 40ae95 33218 40c2d6 28 API calls 33207->33218 33208 40ade6 33215 40ae00 33208->33215 33780 40a3f8 12 API calls 33208->33780 33209 40ada1 33209->33208 33209->33215 33779 40a2db strlen WriteFile 33209->33779 33212 40ae35 33213 40ae75 CloseHandle 33212->33213 33214 40ae7e SetCursor 33212->33214 33213->33214 33214->33207 33215->33212 33781 406b15 8 API calls 33215->33781 33217->33046 33218->33049 33231 40979f 33219->33231 33222 4099ed memcpy memcpy 33225 409a47 33222->33225 33223 408b27 12 API calls 33223->33225 33224 409a85 ??2@YAPAXI ??2@YAPAXI 33226 409ac1 ??2@YAPAXI 33224->33226 33229 409af8 33224->33229 33225->33222 33225->33223 33225->33224 33226->33229 33241 409909 33229->33241 33230 4023b8 33230->33131 33232 4097b1 33231->33232 33233 4097aa ??3@YAXPAX 33231->33233 33234 4097b8 ??3@YAXPAX 33232->33234 33235 4097bf 33232->33235 33233->33232 33234->33235 33236 4097d0 33235->33236 33237 4097c9 ??3@YAXPAX 33235->33237 33238 4097f0 ??2@YAPAXI ??2@YAPAXI 33236->33238 33239 4097e0 ??3@YAXPAX 33236->33239 33240 4097e9 ??3@YAXPAX 33236->33240 33237->33236 33238->33222 33239->33240 33240->33238 33242 4077e4 ??3@YAXPAX 33241->33242 33243 409912 33242->33243 33244 4077e4 ??3@YAXPAX 33243->33244 33245 40991a 33244->33245 33246 4077e4 ??3@YAXPAX 33245->33246 33247 409922 33246->33247 33248 4077e4 ??3@YAXPAX 33247->33248 33249 40992a 33248->33249 33250 4077ae 4 API calls 33249->33250 33251 40993d 33250->33251 33252 4077ae 4 API calls 33251->33252 33253 409947 33252->33253 33254 4077ae 4 API calls 33253->33254 33255 409951 33254->33255 33256 4077ae 4 API calls 33255->33256 33257 40995b 33256->33257 33257->33230 33259 41067e 2 API calls 33258->33259 33260 41073a 33259->33260 33261 41076d memset 33260->33261 33300 406e4c 33260->33300 33262 41078d 33261->33262 33303 410411 RegOpenKeyExA 33262->33303 33266 401e95 strlen strlen 33266->33134 33266->33135 33267 4107ba 33268 4107ef _mbscpy 33267->33268 33304 4106ad _mbscpy 33267->33304 33268->33266 33270 4107cb 33305 410452 RegQueryValueExA 33270->33305 33272 4107e3 RegCloseKey 33272->33268 33273->33138 33274->33144 33306 410411 RegOpenKeyExA 33275->33306 33277 401c4b 33278 401cac 33277->33278 33307 410452 RegQueryValueExA 33277->33307 33278->33147 33278->33148 33280 401c69 33281 401c70 strchr 33280->33281 33282 401ca3 RegCloseKey 33280->33282 33281->33282 33283 401c84 strchr 33281->33283 33282->33278 33283->33282 33284 401c93 33283->33284 33308 406ca4 strlen 33284->33308 33286 401ca0 33286->33282 33287->33150 33288->33135 33289->33140 33290->33167 33311 410411 RegOpenKeyExA 33291->33311 33293 4104a9 33294 4104d2 33293->33294 33312 410452 RegQueryValueExA 33293->33312 33294->33167 33296 4104c1 RegCloseKey 33296->33294 33298->33167 33299->33154 33301 406e5b GetVersionExA 33300->33301 33302 406e6c 33300->33302 33301->33302 33302->33261 33302->33266 33303->33267 33304->33270 33305->33272 33306->33277 33307->33280 33309 406cb5 33308->33309 33310 406cb8 memcpy 33308->33310 33309->33310 33310->33286 33311->33293 33312->33296 33314 4098ad 33313->33314 33316 4098bb 33313->33316 33321 409669 memset SendMessageA 33314->33321 33317 409906 33316->33317 33318 4098f8 33316->33318 33317->33179 33322 4095d9 SendMessageA 33318->33322 33320->33175 33321->33316 33322->33317 33323->33182 33324->33184 33326 404780 FreeLibrary 33325->33326 33327 404736 LoadLibraryA 33326->33327 33328 404747 GetProcAddress 33327->33328 33329 404769 33327->33329 33328->33329 33330 40475f 33328->33330 33331 40477c 33329->33331 33332 404780 FreeLibrary 33329->33332 33330->33329 33331->33184 33332->33331 33334 404794 FreeLibrary 33333->33334 33335 40479e 33333->33335 33334->33335 33335->33184 33337 410166 FreeLibrary 33336->33337 33338 403c1d LoadLibraryA 33337->33338 33339 403c61 33338->33339 33340 403c31 GetProcAddress 33338->33340 33342 410166 FreeLibrary 33339->33342 33340->33339 33341 403c4b 33340->33341 33341->33339 33345 403c58 33341->33345 33343 403c68 33342->33343 33344 40472f 3 API calls 33343->33344 33346 403c73 33344->33346 33345->33343 33416 4036d7 33346->33416 33349 4036d7 26 API calls 33350 403c87 33349->33350 33351 4036d7 26 API calls 33350->33351 33352 403c91 33351->33352 33353 4036d7 26 API calls 33352->33353 33354 403c9b 33353->33354 33428 408344 33354->33428 33362 403cd2 33363 403ce4 33362->33363 33609 402bc3 39 API calls 33362->33609 33474 410411 RegOpenKeyExA 33363->33474 33366 403cf7 33367 403d09 33366->33367 33610 402bc3 39 API calls 33366->33610 33475 402c4f 33367->33475 33371 406e4c GetVersionExA 33372 403d1e 33371->33372 33493 410411 RegOpenKeyExA 33372->33493 33374 403d3e 33375 403d4e 33374->33375 33611 402b14 46 API calls 33374->33611 33494 410411 RegOpenKeyExA 33375->33494 33378 403d74 33379 403d84 33378->33379 33612 402b14 46 API calls 33378->33612 33495 410411 RegOpenKeyExA 33379->33495 33382 403daa 33385 403dba 33382->33385 33613 402b14 46 API calls 33382->33613 33496 41017d 33385->33496 33387 404780 FreeLibrary 33388 403dd5 33387->33388 33500 402fcd 33388->33500 33391 402fcd 34 API calls 33392 403ded 33391->33392 33516 4032a9 33392->33516 33401 403e28 33403 403e60 33401->33403 33404 403e33 _mbscpy 33401->33404 33563 40f478 33403->33563 33615 40eca9 302 API calls 33404->33615 33413 410171 FreeLibrary 33412->33413 33414 41017c 33412->33414 33413->33414 33414->33184 33415->33186 33417 4037b7 33416->33417 33418 4036ed 33416->33418 33417->33349 33616 4101d8 UuidFromStringA UuidFromStringA memcpy 33418->33616 33420 403700 33420->33417 33421 403708 strchr 33420->33421 33421->33417 33422 403722 33421->33422 33617 4021ad memset 33422->33617 33424 403731 _mbscpy _mbscpy strlen 33425 403796 _mbscpy 33424->33425 33426 40377b sprintf 33424->33426 33618 4023d7 16 API calls 33425->33618 33426->33425 33429 408354 33428->33429 33619 408043 11 API calls 33429->33619 33433 408372 33434 403ca7 33433->33434 33435 40837d memset 33433->33435 33446 407f93 33434->33446 33622 4104d7 RegEnumKeyExA 33435->33622 33437 4083a9 33438 408444 RegCloseKey 33437->33438 33440 4083ce memset 33437->33440 33623 410411 RegOpenKeyExA 33437->33623 33626 4104d7 RegEnumKeyExA 33437->33626 33438->33434 33624 410452 RegQueryValueExA 33440->33624 33443 408406 33625 4081fd 10 API calls 33443->33625 33445 40841d RegCloseKey 33445->33437 33627 410411 RegOpenKeyExA 33446->33627 33448 407fb5 33449 403cb3 33448->33449 33450 407fbc memset 33448->33450 33458 408458 33449->33458 33628 4104d7 RegEnumKeyExA 33450->33628 33452 408035 RegCloseKey 33452->33449 33454 407fe5 33454->33452 33629 410411 RegOpenKeyExA 33454->33629 33630 407e63 11 API calls 33454->33630 33631 4104d7 RegEnumKeyExA 33454->33631 33457 408018 RegCloseKey 33457->33454 33632 4045d6 33458->33632 33460 408660 33640 404651 33460->33640 33464 4084af wcslen 33464->33460 33465 4084e2 33464->33465 33465->33460 33466 4084ec _wcsncoll 33465->33466 33468 40472f 3 API calls 33465->33468 33469 404780 FreeLibrary 33465->33469 33470 408584 memset 33465->33470 33471 4085b1 memcpy wcschr 33465->33471 33472 408634 LocalFree 33465->33472 33643 404666 _mbscpy 33465->33643 33466->33465 33468->33465 33469->33465 33470->33465 33470->33471 33471->33465 33472->33465 33473 410411 RegOpenKeyExA 33473->33362 33474->33366 33644 410411 RegOpenKeyExA 33475->33644 33477 402c6c 33478 402d97 33477->33478 33479 402c79 memset 33477->33479 33478->33371 33645 4104d7 RegEnumKeyExA 33479->33645 33481 402d8e RegCloseKey 33481->33478 33482 410493 3 API calls 33483 402cd6 memset sprintf 33482->33483 33646 410411 RegOpenKeyExA 33483->33646 33485 402d1a 33486 402d2c sprintf 33485->33486 33647 402bc3 39 API calls 33485->33647 33648 410411 RegOpenKeyExA 33486->33648 33491 402ca4 33491->33481 33491->33482 33492 402d8c 33491->33492 33649 402bc3 39 API calls 33491->33649 33650 4104d7 RegEnumKeyExA 33491->33650 33492->33481 33493->33374 33494->33378 33495->33382 33497 41018b 33496->33497 33498 410166 FreeLibrary 33497->33498 33499 403dca 33498->33499 33499->33387 33651 410411 RegOpenKeyExA 33500->33651 33502 402feb 33503 402ff8 memset 33502->33503 33504 40311e 33502->33504 33652 4104d7 RegEnumKeyExA 33503->33652 33504->33391 33506 403025 33507 403114 RegCloseKey 33506->33507 33508 410493 3 API calls 33506->33508 33511 403094 memset 33506->33511 33513 4104d7 RegEnumKeyExA 33506->33513 33514 4030eb RegCloseKey 33506->33514 33655 402da5 26 API calls 33506->33655 33507->33504 33509 40304a memset sprintf 33508->33509 33653 410411 RegOpenKeyExA 33509->33653 33654 4104d7 RegEnumKeyExA 33511->33654 33513->33506 33514->33506 33517 4032c7 33516->33517 33524 40339b 33516->33524 33656 4021ad memset 33517->33656 33519 4032d3 33657 403158 strlen GetPrivateProfileStringA strchr strlen memcpy 33519->33657 33521 4032dc 33522 4032ea memset GetPrivateProfileSectionA 33521->33522 33658 4023d7 16 API calls 33521->33658 33522->33524 33528 403321 33522->33528 33531 4034d6 memset memset 33524->33531 33525 40338d strlen 33525->33524 33525->33528 33527 403342 strchr 33527->33528 33528->33524 33528->33525 33659 4021ad memset 33528->33659 33660 403158 strlen GetPrivateProfileStringA strchr strlen memcpy 33528->33660 33661 4023d7 16 API calls 33528->33661 33532 410493 3 API calls 33531->33532 33533 403531 33532->33533 33534 403538 _mbscpy 33533->33534 33538 403571 33533->33538 33662 406af3 strlen _mbscat 33534->33662 33536 403557 _mbscat 33663 4033e2 19 API calls 33536->33663 33539 403977 33538->33539 33664 404666 _mbscpy 33539->33664 33541 40399c 33545 4039f1 33541->33545 33665 40edd5 memset memset 33541->33665 33686 40f057 33541->33686 33702 4038da 21 API calls 33541->33702 33546 404780 FreeLibrary 33545->33546 33547 4039fd 33546->33547 33548 4037bc memset memset 33547->33548 33710 443a35 memset 33548->33710 33551 4038d4 33551->33401 33614 40eca9 302 API calls 33551->33614 33553 403820 33554 406ca4 2 API calls 33553->33554 33555 403835 33554->33555 33556 406ca4 2 API calls 33555->33556 33557 403847 strchr 33556->33557 33558 403876 _mbscpy 33557->33558 33559 403889 strlen 33557->33559 33560 4038b1 _mbscpy 33558->33560 33559->33560 33561 403896 sprintf 33559->33561 33722 4023d7 16 API calls 33560->33722 33561->33560 33564 4446d0 33563->33564 33565 40f488 RegOpenKeyExA 33564->33565 33566 40f4b3 RegOpenKeyExA 33565->33566 33567 403e6c 33565->33567 33568 40f5a5 RegCloseKey 33566->33568 33569 40f4cd RegQueryValueExA 33566->33569 33577 40f2e4 33567->33577 33568->33567 33570 40f59b RegCloseKey 33569->33570 33571 40f4fc 33569->33571 33570->33568 33572 40472f 3 API calls 33571->33572 33573 40f509 33572->33573 33573->33570 33574 40f591 LocalFree 33573->33574 33575 40f555 memcpy memcpy 33573->33575 33574->33570 33727 40f177 11 API calls 33575->33727 33578 406e4c GetVersionExA 33577->33578 33579 40f305 33578->33579 33580 4045d6 7 API calls 33579->33580 33588 40f321 33580->33588 33581 404651 FreeLibrary 33582 403e72 33581->33582 33589 4437d7 memset 33582->33589 33583 40f45e 33583->33581 33584 40f38b memset WideCharToMultiByte 33585 40f3bb _strnicmp 33584->33585 33584->33588 33586 40f3d3 WideCharToMultiByte 33585->33586 33585->33588 33587 40f400 WideCharToMultiByte 33586->33587 33586->33588 33587->33588 33588->33583 33588->33584 33590 41072b 9 API calls 33589->33590 33591 443816 33590->33591 33728 40732d strlen strlen 33591->33728 33596 41072b 9 API calls 33597 44383d 33596->33597 33598 40732d 3 API calls 33597->33598 33599 443847 33598->33599 33600 4436ff 65 API calls 33599->33600 33601 443853 memset memset 33600->33601 33602 410493 3 API calls 33601->33602 33603 4438a6 ExpandEnvironmentStringsA strlen 33602->33603 33604 4438e1 _strcmpi 33603->33604 33605 4438d2 33603->33605 33606 403e7e 33604->33606 33607 4438f9 33604->33607 33605->33604 33606->33184 33608 4436ff 65 API calls 33607->33608 33608->33606 33609->33363 33610->33367 33611->33375 33612->33379 33613->33385 33614->33401 33615->33403 33616->33420 33617->33424 33618->33417 33620 40818e 33619->33620 33621 410411 RegOpenKeyExA 33620->33621 33621->33433 33622->33437 33623->33437 33624->33443 33625->33445 33626->33437 33627->33448 33628->33454 33629->33454 33630->33457 33631->33454 33633 404651 FreeLibrary 33632->33633 33634 4045de LoadLibraryA 33633->33634 33635 40464c 33634->33635 33636 4045ef GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 33634->33636 33635->33460 33635->33464 33637 404638 33636->33637 33638 40463e 33637->33638 33639 404651 FreeLibrary 33637->33639 33638->33635 33639->33635 33641 403cbf 33640->33641 33642 404657 FreeLibrary 33640->33642 33641->33473 33642->33641 33643->33465 33644->33477 33645->33491 33646->33485 33647->33486 33648->33491 33649->33491 33650->33491 33651->33502 33652->33506 33653->33506 33654->33506 33655->33506 33656->33519 33657->33521 33658->33522 33659->33527 33660->33528 33661->33528 33662->33536 33663->33538 33664->33541 33703 407649 33665->33703 33668 407649 _mbsnbcat 33669 40ef18 RegOpenKeyExA 33668->33669 33670 40ef38 RegQueryValueExA 33669->33670 33671 40f04e 33669->33671 33672 40f045 RegCloseKey 33670->33672 33673 40ef65 33670->33673 33671->33541 33672->33671 33673->33672 33674 40efea 33673->33674 33707 404666 _mbscpy 33673->33707 33674->33672 33708 4012ee strlen 33674->33708 33676 40ef86 33678 40472f 3 API calls 33676->33678 33683 40ef8b 33678->33683 33679 40f013 RegQueryValueExA 33679->33672 33680 40f036 33679->33680 33680->33672 33681 40efdf 33682 404780 FreeLibrary 33681->33682 33682->33674 33683->33681 33684 40efd6 LocalFree 33683->33684 33685 40efba memcpy 33683->33685 33684->33681 33685->33684 33709 404666 _mbscpy 33686->33709 33688 40f06f 33689 4045d6 7 API calls 33688->33689 33690 40f07d 33689->33690 33691 40f157 33690->33691 33692 40472f 3 API calls 33690->33692 33693 404651 FreeLibrary 33691->33693 33697 40f08a 33692->33697 33694 40f166 33693->33694 33695 404780 FreeLibrary 33694->33695 33696 40f171 33695->33696 33696->33541 33697->33691 33698 40f10c WideCharToMultiByte 33697->33698 33699 40f12d strlen 33698->33699 33700 40f14e LocalFree 33698->33700 33699->33700 33701 40f13d _mbscpy 33699->33701 33700->33691 33701->33700 33702->33541 33704 407675 33703->33704 33705 407656 _mbsnbcat 33704->33705 33706 407679 33704->33706 33705->33704 33706->33668 33707->33676 33708->33679 33709->33688 33723 410411 RegOpenKeyExA 33710->33723 33712 443a6f 33713 40380c 33712->33713 33724 410452 RegQueryValueExA 33712->33724 33713->33551 33721 4021ad memset 33713->33721 33715 443a88 33716 443ac0 RegCloseKey 33715->33716 33725 410452 RegQueryValueExA 33715->33725 33716->33713 33718 443aa5 33718->33716 33726 443d5d 30 API calls 33718->33726 33720 443abe 33720->33716 33721->33553 33722->33551 33723->33712 33724->33715 33725->33718 33726->33720 33727->33574 33729 407358 33728->33729 33730 40734a _mbscat 33728->33730 33731 4436ff 33729->33731 33730->33729 33748 407c2c 33731->33748 33734 44373a 33735 443761 33734->33735 33736 443745 33734->33736 33756 407c87 33734->33756 33737 407c2c 9 API calls 33735->33737 33773 443683 52 API calls 33736->33773 33745 44378d 33737->33745 33739 407c87 9 API calls 33739->33745 33740 4437bb 33770 407d1f 33740->33770 33744 407d1f FindClose 33746 4437d1 33744->33746 33745->33739 33745->33740 33747 4436ff 65 API calls 33745->33747 33766 407bf1 33745->33766 33746->33596 33747->33745 33749 407d1f FindClose 33748->33749 33750 407c39 33749->33750 33751 406ca4 2 API calls 33750->33751 33752 407c4c strlen strlen 33751->33752 33753 407c70 33752->33753 33754 407c79 33752->33754 33774 406e81 strlen _mbscat _mbscpy _mbscat 33753->33774 33754->33734 33757 407c92 FindFirstFileA 33756->33757 33758 407cb3 FindNextFileA 33756->33758 33759 407cce 33757->33759 33760 407cd5 strlen strlen 33758->33760 33761 407cc9 33758->33761 33759->33760 33763 407d0e 33759->33763 33760->33763 33764 407d05 33760->33764 33762 407d1f FindClose 33761->33762 33762->33759 33763->33734 33775 406e81 strlen _mbscat _mbscpy _mbscat 33764->33775 33767 407c23 33766->33767 33768 407bfb strcmp 33766->33768 33767->33745 33768->33767 33769 407c12 strcmp 33768->33769 33769->33767 33771 407d32 33770->33771 33772 407d28 FindClose 33770->33772 33771->33744 33772->33771 33773->33734 33774->33754 33775->33763 33776->33201 33777->33197 33778->33209 33779->33208 33780->33215 33781->33212 33782->33207 33939 426928 CloseHandle memset memset 34097 405f2b 12 API calls 34099 42df2e 127 API calls __fprintf_l 32884 410531 32887 410344 32884->32887 32888 410351 32887->32888 32889 410398 memset GetPrivateProfileStringA 32888->32889 32890 41035f memset 32888->32890 32895 4073d5 strlen 32889->32895 32900 40735c sprintf memcpy 32890->32900 32893 410381 WritePrivateProfileStringA 32894 4103da 32893->32894 32896 4073e9 32895->32896 32897 4073eb 32895->32897 32896->32894 32899 407432 32897->32899 32901 40710b strtoul 32897->32901 32899->32894 32900->32893 32901->32897 34100 43f332 133 API calls 34102 418f35 61 API calls 34104 425e13 109 API calls __fprintf_l 33946 411136 InterlockedCompareExchange RtlInitializeCriticalSection 33948 425e13 19 API calls 33952 440132 34 API calls 33954 4111c1 RtlInitializeCriticalSection memset 34109 4157c8 16 API calls __fprintf_l 34111 43f3ce 138 API calls 33957 4275cd 44 API calls 34113 424852 108 API calls __fprintf_l 34115 42dbd4 18 API calls __fprintf_l 33960 40c5d8 17 API calls 34116 432bda 16 API calls __fprintf_l 34117 43ebd9 22 API calls 33783 4105dd FindResourceA 33784 4105f6 SizeofResource 33783->33784 33785 410620 33783->33785 33784->33785 33786 410607 LoadResource 33784->33786 33786->33785 33787 410615 LockResource 33786->33787 33787->33785 34120 4013de 12 API calls 34123 424852 76 API calls __fprintf_l 33964 4141e7 15 API calls 34125 43ebdd 25 API calls 34126 43efec 18 API calls 34128 443ff5 _onexit 33966 4021f6 14 API calls 34130 427bfb 36 API calls 33968 433982 16 API calls 33970 411182 InterlockedCompareExchange RtlDeleteCriticalSection 34133 412786 _endthreadex 33971 401591 GetSystemMetrics GetSystemMetrics 73BBAC50 GetWindowRect MoveWindow 34136 432b91 15 API calls 34137 43eb91 17 API calls 33974 410597 memset _itoa WritePrivateProfileStringA GetPrivateProfileIntA 34138 43ff95 20 API calls 34139 42af9d 31 API calls 34140 424852 119 API calls __fprintf_l 34142 4143a4 18 API calls 34145 409fae 12 API calls 33979 419db5 42 API calls 34146 4167b5 memset __fprintf_l 34147 4293b4 10 API calls 33980 40f5b8 66 API calls 33982 4375b9 22 API calls 34152 4243bd 15 API calls __fprintf_l

                          Executed Functions

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 129 408043-40818c memset * 4 GetComputerNameA GetUserNameA MultiByteToWideChar * 2 strlen * 2 memcpy 130 4081c2-4081c5 129->130 131 40818e 129->131 133 4081f6-4081fa 130->133 134 4081c7-4081d0 130->134 132 408194-40819d 131->132 135 4081a4-4081c0 132->135 136 40819f-4081a3 132->136 137 4081d2-4081d6 134->137 138 4081d7-4081f4 134->138 135->130 135->132 136->135 137->138 138->133 138->134
                          APIs
                          • memset.MSVCRT ref: 004080A5
                          • memset.MSVCRT ref: 004080B9
                          • memset.MSVCRT ref: 004080D3
                          • memset.MSVCRT ref: 004080E8
                          • GetComputerNameA.KERNEL32(?,?), ref: 0040810A
                          • GetUserNameA.ADVAPI32(?,?), ref: 0040811E
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 0040813D
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 00408152
                          • strlen.MSVCRT ref: 0040815B
                          • strlen.MSVCRT ref: 0040816A
                          • memcpy.MSVCRT ref: 0040817C
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset$ByteCharMultiNameWidestrlen$ComputerUsermemcpy
                          • String ID: 5$H$O$b$i$}$}
                          • API String ID: 1832431107-3760989150
                          • Opcode ID: 79ae67408c577b497298e938f7cc844113f9d56d662cffe44a33c18994f8cf05
                          • Instruction ID: 839b780f30062d9b3c48c7c4bb1edbc251b0819f5d773de0f2740150403ea89f
                          • Opcode Fuzzy Hash: 79ae67408c577b497298e938f7cc844113f9d56d662cffe44a33c18994f8cf05
                          • Instruction Fuzzy Hash: D151D771C0025DAEDB11CBA8CC41BEEBBBCEF49314F0441EAE555AA182D3389B45CB65
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 432 407c87-407c90 433 407c92-407cb1 FindFirstFileA 432->433 434 407cb3-407cc7 FindNextFileA 432->434 435 407cce-407cd3 433->435 436 407cd5-407d03 strlen * 2 434->436 437 407cc9 call 407d1f 434->437 435->436 439 407d18-407d1e 435->439 440 407d12 436->440 441 407d05-407d10 call 406e81 436->441 437->435 443 407d15-407d17 440->443 441->443 443->439
                          APIs
                          • FindFirstFileA.KERNELBASE(?,?,?,?,0044375D,*.oeaccount,.8D,?,00000104), ref: 00407C9D
                          • FindNextFileA.KERNELBASE(?,?,?,?,0044375D,*.oeaccount,.8D,?,00000104), ref: 00407CBB
                          • strlen.MSVCRT ref: 00407CEB
                          • strlen.MSVCRT ref: 00407CF3
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: FileFindstrlen$FirstNext
                          • String ID: .8D
                          • API String ID: 379999529-2881260426
                          • Opcode ID: 154419784104938abdfe7f8196f43bddff311a2641cbca57966d1cc2155f4921
                          • Instruction ID: eb3e2fb57be8f0c3c515892a2c877e6408fe4d7e79a86a2feb9bdace6263c32c
                          • Opcode Fuzzy Hash: 154419784104938abdfe7f8196f43bddff311a2641cbca57966d1cc2155f4921
                          • Instruction Fuzzy Hash: 2F11A072909201AFE3109B38D844AEB73DCEF45325F600A2FF05AE31C1EB38A9409729
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          • memset.MSVCRT ref: 00401E82
                          • strlen.MSVCRT ref: 00401E9B
                          • strlen.MSVCRT ref: 00401EA9
                          • strlen.MSVCRT ref: 00401EEF
                          • strlen.MSVCRT ref: 00401EFD
                          • memset.MSVCRT ref: 00401FA8
                          • atoi.MSVCRT ref: 00401FD7
                          • memset.MSVCRT ref: 00401FFA
                          • sprintf.MSVCRT ref: 00402027
                            • Part of subcall function 00410493: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 004104CC
                          • memset.MSVCRT ref: 0040207D
                          • memset.MSVCRT ref: 00402092
                          • strlen.MSVCRT ref: 00402098
                          • strlen.MSVCRT ref: 004020A6
                          • strlen.MSVCRT ref: 004020D9
                          • strlen.MSVCRT ref: 004020E7
                          • memset.MSVCRT ref: 0040200F
                            • Part of subcall function 00406E81: _mbscpy.MSVCRT ref: 00406E89
                            • Part of subcall function 00406E81: _mbscat.MSVCRT ref: 00406E98
                          • _mbscpy.MSVCRT ref: 0040216E
                          • RegCloseKey.ADVAPI32(00000000), ref: 00402178
                          • ExpandEnvironmentStringsA.KERNEL32(%programfiles%\Mozilla Thunderbird,?,00000104), ref: 00402193
                            • Part of subcall function 00406D1F: GetFileAttributesA.KERNELBASE(?,00401EDD,?), ref: 00406D23
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: strlen$memset$Close_mbscpy$AttributesEnvironmentExpandFileStrings_mbscatatoisprintf
                          • String ID: %programfiles%\Mozilla Thunderbird$%s\Main$Install Directory$Mozilla\Profiles$Software\Classes\Software\Qualcomm\Eudora\CommandLine\current$Software\Mozilla\Mozilla Thunderbird$Software\Qualcomm\Eudora\CommandLine$Thunderbird\Profiles$current$nss3.dll$sqlite3.dll
                          • API String ID: 1846531875-4223776976
                          • Opcode ID: 6aa4cd9d89fa12e6f5449d6eef6c1575bbd370b4a07fc5a8c776129ac04f2371
                          • Instruction ID: f32954dd371ee46ce489a3e15048bba03ea5248cf67d2e34683548b394895fb7
                          • Opcode Fuzzy Hash: 6aa4cd9d89fa12e6f5449d6eef6c1575bbd370b4a07fc5a8c776129ac04f2371
                          • Instruction Fuzzy Hash: CA91D772804118AAEB21E7A1CC46FDF77BC9F54315F1400BBF608F2182EB789B858B59
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                            • Part of subcall function 00404A94: LoadLibraryA.KERNEL32(comctl32.dll), ref: 00404AB3
                            • Part of subcall function 00404A94: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404AC5
                            • Part of subcall function 00404A94: FreeLibrary.KERNEL32(00000000), ref: 00404AD9
                            • Part of subcall function 00404A94: MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B04
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040CEB2
                          • DeleteObject.GDI32(?), ref: 0040CEC8
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: Library$??3@AddressDeleteFreeLoadMessageObjectProc
                          • String ID: $/deleteregkey$/savelangfile$Error$Failed to load the executable file !
                          • API String ID: 745651260-375988210
                          • Opcode ID: 3ead8dc900f3123aa2ba669505af08cf64fa6c44fe5d0b8ef6125ed5f56e8d9c
                          • Instruction ID: 177dcc30e6d6fe1e6f6b961e060c6fa8e32a60297cdf5fc43279ddd28c1616a1
                          • Opcode Fuzzy Hash: 3ead8dc900f3123aa2ba669505af08cf64fa6c44fe5d0b8ef6125ed5f56e8d9c
                          • Instruction Fuzzy Hash: 3661A075408341DBDB20AFA1DC88A9FB7F8BF85305F00093FF545A21A2DB789904CB5A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                            • Part of subcall function 00410166: FreeLibrary.KERNELBASE(?,00403C1D), ref: 00410172
                          • LoadLibraryA.KERNELBASE(pstorec.dll), ref: 00403C22
                          • GetProcAddress.KERNEL32(00000000,PStoreCreateInstance), ref: 00403C37
                          • _mbscpy.MSVCRT ref: 00403E41
                          Strings
                          • pstorec.dll, xrefs: 00403C1D
                          • www.google.com:443/Please log in to your Google Account, xrefs: 00403C91
                          • Software\Microsoft\Office\15.0\Outlook\Profiles, xrefs: 00403D5B
                          • Software\Microsoft\Windows Messaging Subsystem\Profiles, xrefs: 00403D28
                          • PStoreCreateInstance, xrefs: 00403C31
                          • Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles, xrefs: 00403D2F
                          • www.google.com/Please log in to your Google Account, xrefs: 00403C87
                          • Software\Microsoft\Internet Account Manager\Accounts, xrefs: 00403CC3
                          • www.google.com:443/Please log in to your Gmail account, xrefs: 00403C7D
                          • Software\Microsoft\Office\16.0\Outlook\Profiles, xrefs: 00403D91
                          • www.google.com/Please log in to your Gmail account, xrefs: 00403C73
                          • Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts, xrefs: 00403CE8
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: Library$AddressFreeLoadProc_mbscpy
                          • String ID: PStoreCreateInstance$Software\Microsoft\Internet Account Manager\Accounts$Software\Microsoft\Office\15.0\Outlook\Profiles$Software\Microsoft\Office\16.0\Outlook\Profiles$Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts$Software\Microsoft\Windows Messaging Subsystem\Profiles$Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles$pstorec.dll$www.google.com/Please log in to your Gmail account$www.google.com/Please log in to your Google Account$www.google.com:443/Please log in to your Gmail account$www.google.com:443/Please log in to your Google Account
                          • API String ID: 1197458902-317895162
                          • Opcode ID: f6bc8121a93fa9ff4bc87b9f29a8f644e5a8c2d28e7501eaeea369390cda5a4c
                          • Instruction ID: 8c3092e028ed30b7bcb0bf0438431f6e947b4810b401e401bf51def59c6c6aaf
                          • Opcode Fuzzy Hash: f6bc8121a93fa9ff4bc87b9f29a8f644e5a8c2d28e7501eaeea369390cda5a4c
                          • Instruction Fuzzy Hash: 5C51A571600615B6E714AF71CD86FEAB76CAF00709F20053FF904B61C2DBBDBA5486A9
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 231 40f478-40f4ad call 4446d0 RegOpenKeyExA 234 40f4b3-40f4c7 RegOpenKeyExA 231->234 235 40f5af-40f5b5 231->235 236 40f5a5-40f5a9 RegCloseKey 234->236 237 40f4cd-40f4f6 RegQueryValueExA 234->237 236->235 238 40f59b-40f59f RegCloseKey 237->238 239 40f4fc-40f50b call 40472f 237->239 238->236 239->238 242 40f511-40f549 call 4047a0 239->242 242->238 245 40f54b-40f553 242->245 246 40f591-40f595 LocalFree 245->246 247 40f555-40f58c memcpy * 2 call 40f177 245->247 246->238 247->246
                          APIs
                          • RegOpenKeyExA.KERNELBASE(80000001,Software\Microsoft\IdentityCRL,00000000,00020019,?,?,?,?,?,00403E6C,?), ref: 0040F4A9
                          • RegOpenKeyExA.KERNELBASE(?,Dynamic Salt,00000000,00020019,?,?,?,?,?,00403E6C,?), ref: 0040F4C3
                          • RegQueryValueExA.ADVAPI32(?,Value,00000000,?,?,?,?,?,?,?,00403E6C,?), ref: 0040F4EE
                          • RegCloseKey.ADVAPI32(?,?,?,?,?,00403E6C,?), ref: 0040F59F
                            • Part of subcall function 0040472F: LoadLibraryA.KERNELBASE(?,0040F08A,?,00000000), ref: 00404737
                            • Part of subcall function 0040472F: GetProcAddress.KERNEL32(00000000,?), ref: 0040474F
                          • memcpy.MSVCRT ref: 0040F55C
                          • memcpy.MSVCRT ref: 0040F571
                            • Part of subcall function 0040F177: RegOpenKeyExA.ADVAPI32(0040F591,Creds,00000000,00020019,0040F591,%GKP$^%^&LL(%^$^O&TR$^%^GV6;lxzd,00000040,?,?,0040F591,?,?,?,?), ref: 0040F1A1
                            • Part of subcall function 0040F177: memset.MSVCRT ref: 0040F1BF
                            • Part of subcall function 0040F177: RegEnumKeyA.ADVAPI32(?,00000000,?,000000FF), ref: 0040F2C3
                            • Part of subcall function 0040F177: RegCloseKey.ADVAPI32(?), ref: 0040F2D4
                          • LocalFree.KERNEL32(?,?,00001000,?,?,?,?,?,00403E6C,?), ref: 0040F595
                          • RegCloseKey.KERNELBASE(?,?,?,?,?,00403E6C,?), ref: 0040F5A9
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: CloseOpen$memcpy$AddressEnumFreeLibraryLoadLocalProcQueryValuememset
                          • String ID: %GKP$^%^&LL(%^$^O&TR$^%^GV6;lxzd$Dynamic Salt$Software\Microsoft\IdentityCRL$Value
                          • API String ID: 2768085393-1693574875
                          • Opcode ID: 1864ca7fcc736b3b4d801ba3f1c1f05252c21c348af15f97a92f57202a3284fd
                          • Instruction ID: 1e95abdde633212bff99c09de4f86b0a88236e9255236bdff490daf84838ddbe
                          • Opcode Fuzzy Hash: 1864ca7fcc736b3b4d801ba3f1c1f05252c21c348af15f97a92f57202a3284fd
                          • Instruction Fuzzy Hash: 3F316FB2108305BFD710DF51DC80D9BB7ECEB89758F00093AFA84E2151D734D9198BAA
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 249 44412e-44414a call 44431c GetModuleHandleA 252 44414c-444157 249->252 253 44416b-44416e 249->253 252->253 254 444159-444162 252->254 255 444197-4441e4 __set_app_type __p__fmode __p__commode call 444318 253->255 257 444164-444169 254->257 258 444183-444187 254->258 263 4441e6-4441f1 __setusermatherr 255->263 264 4441f2-44424c call 444306 _initterm __getmainargs _initterm 255->264 257->253 260 444170-444177 257->260 258->253 261 444189-44418b 258->261 260->253 265 444179-444181 260->265 262 444191-444194 261->262 262->255 263->264 268 44424e-444256 264->268 269 444288-44428b 264->269 265->262 272 44425c-44425f 268->272 273 444258-44425a 268->273 270 444265-444269 269->270 271 44428d-444291 269->271 275 44426f-444280 GetStartupInfoA 270->275 276 44426b-44426d 270->276 271->269 272->270 274 444261-444262 272->274 273->268 273->272 274->270 277 444282-444286 275->277 278 444293-444295 275->278 276->274 276->275 279 444296-4442aa GetModuleHandleA call 40cc66 277->279 278->279 282 4442b3-4442f3 _cexit call 444355 279->282 283 4442ac-4442ad exit 279->283 283->282
                          APIs
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: HandleModule_initterm$InfoStartup__getmainargs__p__commode__p__fmode__set_app_type__setusermatherr_cexitexit
                          • String ID:
                          • API String ID: 3662548030-0
                          • Opcode ID: 4b9c7533954e26831581d23f4790c468d578c52e19518a271cf5a88ab33fa073
                          • Instruction ID: fc298a0057bb7b157c7d5bb9a283569fada43ed9a32b195ba4478b44b5386df1
                          • Opcode Fuzzy Hash: 4b9c7533954e26831581d23f4790c468d578c52e19518a271cf5a88ab33fa073
                          • Instruction Fuzzy Hash: 9E419F74D00714DFEB209FA4D8897AE7BB4BB85715F20016BF4519B2A2D7B88C82CB58
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          • memset.MSVCRT ref: 004437F8
                            • Part of subcall function 0040732D: strlen.MSVCRT ref: 0040732F
                            • Part of subcall function 0040732D: strlen.MSVCRT ref: 0040733A
                            • Part of subcall function 0040732D: _mbscat.MSVCRT ref: 00407351
                            • Part of subcall function 0041072B: memset.MSVCRT ref: 00410780
                            • Part of subcall function 0041072B: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,00000104), ref: 004107E9
                            • Part of subcall function 0041072B: _mbscpy.MSVCRT ref: 004107F7
                          • memset.MSVCRT ref: 00443866
                          • memset.MSVCRT ref: 00443881
                            • Part of subcall function 00410493: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 004104CC
                          • ExpandEnvironmentStringsA.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000000,00000104,00000104,?,?,?,?), ref: 004438BA
                          • strlen.MSVCRT ref: 004438C8
                          • _strcmpi.MSVCRT ref: 004438EE
                          Strings
                          • \Microsoft\Windows Mail, xrefs: 00443816
                          • Software\Microsoft\Windows Live Mail, xrefs: 00443897
                          • Store Root, xrefs: 00443892
                          • \Microsoft\Windows Live Mail, xrefs: 0044383D
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset$strlen$Close$EnvironmentExpandStrings_mbscat_mbscpy_strcmpi
                          • String ID: Software\Microsoft\Windows Live Mail$Store Root$\Microsoft\Windows Live Mail$\Microsoft\Windows Mail
                          • API String ID: 832325562-2578778931
                          • Opcode ID: 911bb342f14f3170cb2ff673aa6b7b07c4e29c197a8c78c2517f4db812832f04
                          • Instruction ID: 024f477f45f6e85a7703d2448ebd5bdc30730893e4efb81a5a52e1788c76f972
                          • Opcode Fuzzy Hash: 911bb342f14f3170cb2ff673aa6b7b07c4e29c197a8c78c2517f4db812832f04
                          • Instruction Fuzzy Hash: 723166B2508344AAF320FB99DC47FCB77DC9B88715F14441FF648D7182EA78964487AA
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 308 40edd5-40ef32 memset * 2 call 407649 * 2 RegOpenKeyExA 313 40ef38-40ef5f RegQueryValueExA 308->313 314 40f04e-40f054 308->314 315 40f045-40f048 RegCloseKey 313->315 316 40ef65-40ef69 313->316 315->314 316->315 317 40ef6f-40ef79 316->317 318 40ef7b-40ef8d call 404666 call 40472f 317->318 319 40efec 317->319 329 40efdf-40efea call 404780 318->329 330 40ef8f-40efb3 call 4047a0 318->330 320 40efef-40eff2 319->320 320->315 322 40eff4-40f034 call 4012ee RegQueryValueExA 320->322 322->315 328 40f036-40f044 322->328 328->315 329->320 330->329 335 40efb5-40efb8 330->335 336 40efd6-40efd9 LocalFree 335->336 337 40efba-40efcf memcpy 335->337 336->329 337->336
                          APIs
                          • memset.MSVCRT ref: 0040EEDC
                          • memset.MSVCRT ref: 0040EEF4
                            • Part of subcall function 00407649: _mbsnbcat.MSVCRT ref: 00407669
                          • RegOpenKeyExA.KERNELBASE(80000001,00000082,00000000,00020019,?,?,?,?,?,00000000), ref: 0040EF2A
                          • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000082,?,?,?,?,00000000), ref: 0040EF57
                          • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,000000BE,000000BE,?,?,?,?,00000000), ref: 0040F02C
                            • Part of subcall function 00404666: _mbscpy.MSVCRT ref: 004046B5
                            • Part of subcall function 0040472F: LoadLibraryA.KERNELBASE(?,0040F08A,?,00000000), ref: 00404737
                            • Part of subcall function 0040472F: GetProcAddress.KERNEL32(00000000,?), ref: 0040474F
                          • memcpy.MSVCRT ref: 0040EFC7
                          • LocalFree.KERNEL32(?,?,00000000,?,?,?,?,?,00000000), ref: 0040EFD9
                          • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000), ref: 0040F048
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: QueryValuememset$AddressCloseFreeLibraryLoadLocalOpenProc_mbscpy_mbsnbcatmemcpy
                          • String ID:
                          • API String ID: 2012582556-3916222277
                          • Opcode ID: 1aaa39dbd8fb085207e3379016ade5c185f92c0e596cea5d3bc0b7e8a3d19efa
                          • Instruction ID: 747b8e804c7bbb21ad1dd8da88f93546a58f2d2a8080c646c51fe7008e5948b4
                          • Opcode Fuzzy Hash: 1aaa39dbd8fb085207e3379016ade5c185f92c0e596cea5d3bc0b7e8a3d19efa
                          • Instruction Fuzzy Hash: 83811E618087CB9ECB21DBBC8C445DDBF745F17234F0843A9E5B47A2E2D3245A46C7AA
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 338 4037bc-40380e memset * 2 call 443a35 341 4038d4-4038d7 338->341 342 403814-403874 call 4021ad call 406ca4 * 2 strchr 338->342 349 403876-403887 _mbscpy 342->349 350 403889-403894 strlen 342->350 351 4038b1-4038cf _mbscpy call 4023d7 349->351 350->351 352 403896-4038ae sprintf 350->352 351->341 352->351
                          APIs
                          • memset.MSVCRT ref: 004037DD
                          • memset.MSVCRT ref: 004037F1
                            • Part of subcall function 00443A35: memset.MSVCRT ref: 00443A57
                            • Part of subcall function 00443A35: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,000003FF), ref: 00443AC3
                            • Part of subcall function 00406CA4: strlen.MSVCRT ref: 00406CA9
                            • Part of subcall function 00406CA4: memcpy.MSVCRT ref: 00406CBE
                          • strchr.MSVCRT ref: 00403860
                          • _mbscpy.MSVCRT ref: 0040387D
                          • strlen.MSVCRT ref: 00403889
                          • sprintf.MSVCRT ref: 004038A9
                          • _mbscpy.MSVCRT ref: 004038BF
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset$_mbscpystrlen$Closememcpysprintfstrchr
                          • String ID: %s@yahoo.com
                          • API String ID: 317221925-3288273942
                          • Opcode ID: c01e396ce511f8afc2eb7639449ba7f1f99c67e08b3586f0ab7a0846487aca4e
                          • Instruction ID: 0355cd0d48ae578dfdfe4a6cbfa0b9af13deca75d91fcedaec1ea3361aee035e
                          • Opcode Fuzzy Hash: c01e396ce511f8afc2eb7639449ba7f1f99c67e08b3586f0ab7a0846487aca4e
                          • Instruction Fuzzy Hash: D0215773D0412C5EEB21EA55DD41BDA77ACDF45308F0000EBB648F6081E6789F588F55
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 354 4034d6-403536 memset * 2 call 410493 357 403572-403574 354->357 358 403538-403571 _mbscpy call 406af3 _mbscat call 4033e2 354->358 358->357
                          APIs
                          • memset.MSVCRT ref: 004034F6
                          • memset.MSVCRT ref: 0040350C
                            • Part of subcall function 00410493: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 004104CC
                          • _mbscpy.MSVCRT ref: 00403547
                            • Part of subcall function 00406AF3: strlen.MSVCRT ref: 00406AF4
                            • Part of subcall function 00406AF3: _mbscat.MSVCRT ref: 00406B0B
                          • _mbscat.MSVCRT ref: 0040355F
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: _mbscatmemset$Close_mbscpystrlen
                          • String ID: InstallPath$Software\Group Mail$fb.dat
                          • API String ID: 3071782539-966475738
                          • Opcode ID: e35c848a323c92a1d31842152f609aeddade97801a3e26e866ac83a52e1d0630
                          • Instruction ID: 06cca456285af6d778403e239192c4ceeddf5a100a2cf1fec545289e95a886a3
                          • Opcode Fuzzy Hash: e35c848a323c92a1d31842152f609aeddade97801a3e26e866ac83a52e1d0630
                          • Instruction Fuzzy Hash: 6901F07294412866EB20F2658C46FCB7A5C9B65705F0000B7BA49F20C3D9F86BD486A9
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 363 40c9f7-40ca26 ??2@YAPAXI@Z 364 40ca28-40ca2d 363->364 365 40ca2f 363->365 366 40ca31-40ca44 ??2@YAPAXI@Z 364->366 365->366 367 40ca46-40ca4d call 40400d 366->367 368 40ca4f 366->368 370 40ca51-40ca77 367->370 368->370 372 40ca86-40caf9 call 406e26 call 4019b4 memset LoadIconA call 4019b4 _mbscpy 370->372 373 40ca79-40ca80 DeleteObject 370->373 373->372
                          APIs
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??2@$DeleteIconLoadObject_mbscpymemset
                          • String ID:
                          • API String ID: 2054149589-0
                          • Opcode ID: d475ca6c561f5eaf4fc753d3c68d3f995f62fff83656612615d29b2a36e03343
                          • Instruction ID: 30546b7ffc0c4dd123ee27c8339ba671db17b069e44cca125f5e111fbf26b461
                          • Opcode Fuzzy Hash: d475ca6c561f5eaf4fc753d3c68d3f995f62fff83656612615d29b2a36e03343
                          • Instruction Fuzzy Hash: D22190B5900324DBDB10EF648CC97D97BA8AB44705F1445BBEE08EF296D7B849408BA9
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                            • Part of subcall function 00408043: memset.MSVCRT ref: 004080A5
                            • Part of subcall function 00408043: memset.MSVCRT ref: 004080B9
                            • Part of subcall function 00408043: memset.MSVCRT ref: 004080D3
                            • Part of subcall function 00408043: memset.MSVCRT ref: 004080E8
                            • Part of subcall function 00408043: GetComputerNameA.KERNEL32(?,?), ref: 0040810A
                            • Part of subcall function 00408043: GetUserNameA.ADVAPI32(?,?), ref: 0040811E
                            • Part of subcall function 00408043: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 0040813D
                            • Part of subcall function 00408043: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 00408152
                            • Part of subcall function 00408043: strlen.MSVCRT ref: 0040815B
                            • Part of subcall function 00408043: strlen.MSVCRT ref: 0040816A
                            • Part of subcall function 00408043: memcpy.MSVCRT ref: 0040817C
                            • Part of subcall function 00410411: RegOpenKeyExA.KERNELBASE(00401C4B,00401C4B,00000000,00020019,?,00401C4B,?,?,?), ref: 00410424
                          • memset.MSVCRT ref: 00408392
                            • Part of subcall function 004104D7: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 004104FA
                          • memset.MSVCRT ref: 004083E3
                          • RegCloseKey.ADVAPI32(?,?,?), ref: 00408421
                          • RegCloseKey.ADVAPI32(?), ref: 00408448
                          Strings
                          • Software\Google\Google Talk\Accounts, xrefs: 00408363
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset$ByteCharCloseMultiNameWidestrlen$ComputerEnumOpenUsermemcpy
                          • String ID: Software\Google\Google Talk\Accounts
                          • API String ID: 2959138223-1079885057
                          • Opcode ID: de50773ad60ad315725188ace9b51b45ce00f3af3b72c9474aab8c158646e734
                          • Instruction ID: c6fde65740424625f6a31d6a262b66ef11e3a8462d59295f471bfbb40e3c967b
                          • Opcode Fuzzy Hash: de50773ad60ad315725188ace9b51b45ce00f3af3b72c9474aab8c158646e734
                          • Instruction Fuzzy Hash: 5E2183B100824AAED610DF51DD42EABB7DCEF94344F00043EFA84911A2F675DD5D9BAB
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 403 40b783-40b795 404 40b7e2-40b7f6 call 406a00 403->404 405 40b797-40b7ad call 407baf _mbsicmp 403->405 427 40b7f8 call 410411 404->427 428 40b7f8 call 404780 404->428 429 40b7f8 call 403c03 404->429 430 40b7f8 call 410166 404->430 431 40b7f8 call 40472f 404->431 410 40b7d6-40b7e0 405->410 411 40b7af-40b7c8 call 407baf 405->411 410->404 410->405 416 40b7ca-40b7cd 411->416 417 40b7cf 411->417 413 40b7fb-40b80e call 407bbf 420 40b810-40b81c 413->420 421 40b855-40b864 SetCursor 413->421 419 40b7d0-40b7d1 call 40b340 416->419 417->419 419->410 423 40b833-40b852 qsort 420->423 424 40b81e-40b829 420->424 423->421 424->423 427->413 428->413 429->413 430->413 431->413
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: Cursor_mbsicmpqsort
                          • String ID: /nosort$/sort
                          • API String ID: 882979914-1578091866
                          • Opcode ID: 3fd05ea3d2e473999241c6e710ee6662cc18b56f225bb7025ede358bdfc82e44
                          • Instruction ID: 59731eef90b6f0024c6c95bb6f71fb6a55e53d5caa10bc7ba91746e522f0a21b
                          • Opcode Fuzzy Hash: 3fd05ea3d2e473999241c6e710ee6662cc18b56f225bb7025ede358bdfc82e44
                          • Instruction Fuzzy Hash: AF21C4B1704501EFD719AB75C880AA9F3A8FF88314F21013EF419A7292C738B8118B99
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 445 41072b-410742 call 41067e 448 410744-41074d call 406e4c 445->448 449 41076d-41078b memset 445->449 458 41074f-410752 448->458 459 41075e-410761 448->459 450 410797-4107a5 449->450 451 41078d-410790 449->451 454 4107b5-4107bf call 410411 450->454 451->450 453 410792-410795 451->453 453->450 456 4107a7-4107b0 453->456 463 4107c1-4107e9 call 4106ad call 410452 RegCloseKey 454->463 464 4107ef-410802 _mbscpy 454->464 456->454 458->449 461 410754-410757 458->461 462 410768 459->462 461->449 465 410759-41075c 461->465 466 410805-410807 462->466 463->464 464->466 465->449 465->459
                          APIs
                            • Part of subcall function 0041067E: LoadLibraryA.KERNEL32(shell32.dll,0041073A,00000104), ref: 0041068C
                            • Part of subcall function 0041067E: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathA), ref: 004106A1
                          • memset.MSVCRT ref: 00410780
                          • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,00000104), ref: 004107E9
                          • _mbscpy.MSVCRT ref: 004107F7
                            • Part of subcall function 00406E4C: GetVersionExA.KERNEL32(00451168,0000001A,00410749,00000104), ref: 00406E66
                          Strings
                          • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 0041079B, 004107AB
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: AddressCloseLibraryLoadProcVersion_mbscpymemset
                          • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                          • API String ID: 889583718-2036018995
                          • Opcode ID: 24424f8fb7c37ab6dcf975350972c994308c6069d3110df9dc8122139225ba6f
                          • Instruction ID: 55274f9b0d4144c5a5f6b064647028c43f69cf0431b3c32ec78c32e38a1c383e
                          • Opcode Fuzzy Hash: 24424f8fb7c37ab6dcf975350972c994308c6069d3110df9dc8122139225ba6f
                          • Instruction Fuzzy Hash: 2811D071C00218FBEB24F6948C85EEF77AC9B15304F1400B7F95161192E6B99ED4CA99
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • FindResourceA.KERNEL32(?,?,?), ref: 004105EA
                          • SizeofResource.KERNEL32(?,00000000), ref: 004105FB
                          • LoadResource.KERNEL32(?,00000000), ref: 0041060B
                          • LockResource.KERNEL32(00000000), ref: 00410616
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: Resource$FindLoadLockSizeof
                          • String ID:
                          • API String ID: 3473537107-0
                          • Opcode ID: aa79f82f4ecfd8f7b628c1d7de4cc48f572b3be46360eaed4676304fbba1ef3c
                          • Instruction ID: 4a68303d5b5253afd20c9a06ef53f1b3f3171458fb19c91adc6236e38678b247
                          • Opcode Fuzzy Hash: aa79f82f4ecfd8f7b628c1d7de4cc48f572b3be46360eaed4676304fbba1ef3c
                          • Instruction Fuzzy Hash: 88019636600315AB8F155F65DC4599F7FAAFFD63917088036F909CA361D7B1C891C68C
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memset.MSVCRT ref: 0041036C
                            • Part of subcall function 0040735C: sprintf.MSVCRT ref: 00407394
                            • Part of subcall function 0040735C: memcpy.MSVCRT ref: 004073A7
                          • WritePrivateProfileStringA.KERNEL32(?,?,?,?), ref: 00410390
                          • memset.MSVCRT ref: 004103A7
                          • GetPrivateProfileStringA.KERNEL32(?,?,0044551F,?,00002000,?), ref: 004103C5
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: PrivateProfileStringmemset$Writememcpysprintf
                          • String ID:
                          • API String ID: 3143880245-0
                          • Opcode ID: 300669213aa10e30692949e2fcfbaed099003638c554249b47492bf17e1db58e
                          • Instruction ID: 9d0f41c8c3888dc292d70de46467aaf9ffb36b28435196f73ffda5293cd27e0f
                          • Opcode Fuzzy Hash: 300669213aa10e30692949e2fcfbaed099003638c554249b47492bf17e1db58e
                          • Instruction Fuzzy Hash: B501847280431DBFEF116F60EC89EDB7B79EF04314F1000A6FA08A2052D6759D64DB69
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??2@
                          • String ID:
                          • API String ID: 1033339047-0
                          • Opcode ID: c9d9b14cbc3cffdefcd651bca10b6be545bbad424ff6817e9a729584ede19952
                          • Instruction ID: 91b6e48186620c166d1d4af44a265f78501a0d7a4e3c1a8b362a1fb29a74aa2a
                          • Opcode Fuzzy Hash: c9d9b14cbc3cffdefcd651bca10b6be545bbad424ff6817e9a729584ede19952
                          • Instruction Fuzzy Hash: 17F0F9B5901300AFE7549B3CED0672676E4E75C356F04983FA30A8A2F2EB79C8448B08
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??3@mallocmemcpy
                          • String ID:
                          • API String ID: 3831604043-0
                          • Opcode ID: 6dc2a86f1fe2ee347426ab0121a461cac49b5a84b0ae56981e7af52698dffbe8
                          • Instruction ID: 120c5a36fa875b11696935209168df4f9df621bec9a22d80de65970bbd8b26ad
                          • Opcode Fuzzy Hash: 6dc2a86f1fe2ee347426ab0121a461cac49b5a84b0ae56981e7af52698dffbe8
                          • Instruction Fuzzy Hash: 13F0E9727053225FD708EB75B94184B73DDAF84324712482FF505E7282D7389C60CB59
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00406D65: memset.MSVCRT ref: 00406D6F
                            • Part of subcall function 00406D65: _mbscpy.MSVCRT ref: 00406DAF
                          • CreateFontIndirectA.GDI32(?), ref: 00406E44
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: CreateFontIndirect_mbscpymemset
                          • String ID: Arial
                          • API String ID: 3853255127-493054409
                          • Opcode ID: af81b5a79715ac1c537919aec0876ca352f4b846121989fe158db9d7d4b71e29
                          • Instruction ID: b68263c9f29210b4531b01fb65f498acbd183b68a5d206dac463ad1e531dcf8e
                          • Opcode Fuzzy Hash: af81b5a79715ac1c537919aec0876ca352f4b846121989fe158db9d7d4b71e29
                          • Instruction Fuzzy Hash: FFD0C974E4020C67DA10B7A0FC07F49776C5B01705F510421B901B10E2EAA4A15886D9
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00401E60: memset.MSVCRT ref: 00401E82
                            • Part of subcall function 00401E60: strlen.MSVCRT ref: 00401E9B
                            • Part of subcall function 00401E60: strlen.MSVCRT ref: 00401EA9
                            • Part of subcall function 00401E60: strlen.MSVCRT ref: 00401EEF
                            • Part of subcall function 00401E60: strlen.MSVCRT ref: 00401EFD
                          • _strcmpi.MSVCRT ref: 0040CBE4
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: strlen$_strcmpimemset
                          • String ID: /stext
                          • API String ID: 520177685-3817206916
                          • Opcode ID: 1152ae9ba3ffa0329dd0f68586efa17a4cc19575da3326fd738d138d66e7bba5
                          • Instruction ID: cdbc65eb55c3596dd52c6b91df7f07afa5e13005eab10b9a6f004d04cd94ae5a
                          • Opcode Fuzzy Hash: 1152ae9ba3ffa0329dd0f68586efa17a4cc19575da3326fd738d138d66e7bba5
                          • Instruction Fuzzy Hash: CE216271618111DFD35CEB39D8C1A66B3A9FF04314B15427FF41AA7282C738EC118B89
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00404780: FreeLibrary.KERNELBASE(?,?,0040F171,?,00000000), ref: 00404795
                          • LoadLibraryA.KERNELBASE(?,0040F08A,?,00000000), ref: 00404737
                          • GetProcAddress.KERNEL32(00000000,?), ref: 0040474F
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: Library$AddressFreeLoadProc
                          • String ID:
                          • API String ID: 145871493-0
                          • Opcode ID: 19cbb58c83f46949a6f81fbd15abd7b556fa9c3d80d4a4eb7eee3cb29104cd1a
                          • Instruction ID: 2550b76864eeaa7c500838184e9c491a546ed4ce74a868b02878dd57666eb7ef
                          • Opcode Fuzzy Hash: 19cbb58c83f46949a6f81fbd15abd7b556fa9c3d80d4a4eb7eee3cb29104cd1a
                          • Instruction Fuzzy Hash: A5F01BF4600B029FD760AF35E848B9B77E5AF86710F00453EF665E3182D778A545CB58
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetPrivateProfileIntA.KERNEL32(?,?,?,?), ref: 00410407
                            • Part of subcall function 004102F8: memset.MSVCRT ref: 00410316
                            • Part of subcall function 004102F8: _itoa.MSVCRT ref: 0041032D
                            • Part of subcall function 004102F8: WritePrivateProfileStringA.KERNEL32(?,?,00000000), ref: 0041033C
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: PrivateProfile$StringWrite_itoamemset
                          • String ID:
                          • API String ID: 4165544737-0
                          • Opcode ID: 0dc81d5659c27ec3f684feb4a7343de4234ed54be118f3a80d7180ba5ee1fafc
                          • Instruction ID: a6fec7de448531cc7e5bdd8bb9ba05dfe42c6da5839e04c605b7484fd2ec2d67
                          • Opcode Fuzzy Hash: 0dc81d5659c27ec3f684feb4a7343de4234ed54be118f3a80d7180ba5ee1fafc
                          • Instruction Fuzzy Hash: 23E0BD3204060EBFCF125F80EC05AAA7BA6FF04354F24886AFD6804121D77299F0AB99
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • FreeLibrary.KERNELBASE(?,?,0040F171,?,00000000), ref: 00404795
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: FreeLibrary
                          • String ID:
                          • API String ID: 3664257935-0
                          • Opcode ID: 0080a8822f3c614f9ebefc2abddcc045fe481ba4110b5f37c1852287057a9d03
                          • Instruction ID: 32a23a6afe1256adb8d295dcdce629e4b632fcbc5e0d618fa027d99050396328
                          • Opcode Fuzzy Hash: 0080a8822f3c614f9ebefc2abddcc045fe481ba4110b5f37c1852287057a9d03
                          • Instruction Fuzzy Hash: D7D012714003118FDB609F14FD4CBA173E8AF41312F1504B8E994AB192C3749840CA58
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • CreateFileA.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0040ABFF,00000000), ref: 00406ACA
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: CreateFile
                          • String ID:
                          • API String ID: 823142352-0
                          • Opcode ID: 1ce9c131fa00a6cba9e51da9fc4262f8f7b5bc2fb1b2ae73e770c5136e6a3475
                          • Instruction ID: 174152b0962da7481451d0c07619c80c3ba7c59bd8607505f6d9dddbb6799519
                          • Opcode Fuzzy Hash: 1ce9c131fa00a6cba9e51da9fc4262f8f7b5bc2fb1b2ae73e770c5136e6a3475
                          • Instruction Fuzzy Hash: 08C012F06503007FFF204B10AC0AF37369DD780700F1044207E00E40E1C2A14C40C524
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • FreeLibrary.KERNELBASE(?,00403C1D), ref: 00410172
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: FreeLibrary
                          • String ID:
                          • API String ID: 3664257935-0
                          • Opcode ID: 2bb0b70da7ab9a9f1d06c574187436387b11b6424b20dab8934fc130d0c11713
                          • Instruction ID: 507e23945262d0460dd2b0da46a8ed0ea94319227dbecdfb5597338915b85de2
                          • Opcode Fuzzy Hash: 2bb0b70da7ab9a9f1d06c574187436387b11b6424b20dab8934fc130d0c11713
                          • Instruction Fuzzy Hash: 6EC04C35510B019BEB219B22D949753B7E4AB05316F40C81CA59695451D7BCE494CE18
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • EnumResourceNamesA.KERNEL32(?,?,Function_000105DD,00000000), ref: 00410672
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: EnumNamesResource
                          • String ID:
                          • API String ID: 3334572018-0
                          • Opcode ID: 11eb8b3ad73b6762afc3db70ccaf6c8089b2cfe60785521265f3d13c2ac885fb
                          • Instruction ID: e40f58546d13f5b106010a29914381b046978f91ca1901c00a2019c551bf0e65
                          • Opcode Fuzzy Hash: 11eb8b3ad73b6762afc3db70ccaf6c8089b2cfe60785521265f3d13c2ac885fb
                          • Instruction Fuzzy Hash: A0C09B31554341A7C701DF108C09F1A7695BB55705F504C297151940A4C7514054DB15
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • FindClose.KERNELBASE(?,00407C39,?,?,00000000,.8D,0044373A,*.oeaccount,.8D,?,00000104), ref: 00407D29
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: CloseFind
                          • String ID:
                          • API String ID: 1863332320-0
                          • Opcode ID: fadcbaaacaeb9138fef9dc8452ad8ac79757f966f14a2d9034369e41b7735666
                          • Instruction ID: e21386352e8edd65572014a1fcaa83e24a75218a268847cd9e3b74dd15e40f0a
                          • Opcode Fuzzy Hash: fadcbaaacaeb9138fef9dc8452ad8ac79757f966f14a2d9034369e41b7735666
                          • Instruction Fuzzy Hash: 50C092349109018FD62C9F38DC5A52A77A0BF5A3343B40F6CA0F3D20F0E778A842CA08
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • RegOpenKeyExA.KERNELBASE(00401C4B,00401C4B,00000000,00020019,?,00401C4B,?,?,?), ref: 00410424
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: Open
                          • String ID:
                          • API String ID: 71445658-0
                          • Opcode ID: 21d2125e3753e601ca1b20deba59a5865270c48a78257e55b283f3ccc3de6cc0
                          • Instruction ID: 9e85f5290c785a84adc9a585aa79e4266a03e2402c05001ad2ac5d5d83fda341
                          • Opcode Fuzzy Hash: 21d2125e3753e601ca1b20deba59a5865270c48a78257e55b283f3ccc3de6cc0
                          • Instruction Fuzzy Hash: 40C09B39544301BFDE114F40FD05F09BB61BB84F05F504414B244240B182714414EB57
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetFileAttributesA.KERNELBASE(?,00401EDD,?), ref: 00406D23
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: AttributesFile
                          • String ID:
                          • API String ID: 3188754299-0
                          • Opcode ID: 2ea5a109eb267fb6083926362ae3c8176b926bbef034cd1da8757df3be379db2
                          • Instruction ID: 1a596b20ff26773e60743876e99a20c5f0c5c53ebb8dbfb842e64d2fd6ed3a7e
                          • Opcode Fuzzy Hash: 2ea5a109eb267fb6083926362ae3c8176b926bbef034cd1da8757df3be379db2
                          • Instruction Fuzzy Hash: 76B012792108005FCF1807349C4904D35506F45631760073CF033C00F0D720CC60BA00
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Non-executed Functions

                          APIs
                          • LoadLibraryA.KERNEL32(advapi32.dll,?,00404A6B,?,00404981,?,?,00000000,?,00000000,?), ref: 004047D5
                          • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA), ref: 004047E9
                          • GetProcAddress.KERNEL32(0045175C,CryptReleaseContext), ref: 004047F5
                          • GetProcAddress.KERNEL32(0045175C,CryptCreateHash), ref: 00404801
                          • GetProcAddress.KERNEL32(0045175C,CryptGetHashParam), ref: 0040480D
                          • GetProcAddress.KERNEL32(0045175C,CryptHashData), ref: 00404819
                          • GetProcAddress.KERNEL32(0045175C,CryptDestroyHash), ref: 00404825
                          • GetProcAddress.KERNEL32(0045175C,CryptDecrypt), ref: 00404831
                          • GetProcAddress.KERNEL32(0045175C,CryptDeriveKey), ref: 0040483D
                          • GetProcAddress.KERNEL32(0045175C,CryptImportKey), ref: 00404849
                          • GetProcAddress.KERNEL32(0045175C,CryptDestroyKey), ref: 00404855
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: AddressProc$LibraryLoad
                          • String ID: CryptAcquireContextA$CryptCreateHash$CryptDecrypt$CryptDeriveKey$CryptDestroyHash$CryptDestroyKey$CryptGetHashParam$CryptHashData$CryptImportKey$CryptReleaseContext$advapi32.dll
                          • API String ID: 2238633743-192783356
                          • Opcode ID: cdc1f63c0c232f946f357b8b2aefe836e2e50651c8dba3e6496bd37ee8642a43
                          • Instruction ID: 96d911507a8a1b00aef88e3b883ab5eac538cf63a3166b36270edd586bbeed94
                          • Opcode Fuzzy Hash: cdc1f63c0c232f946f357b8b2aefe836e2e50651c8dba3e6496bd37ee8642a43
                          • Instruction Fuzzy Hash: A501C974940744AFDB31AF769C09E06BEF1EFA97003224D2EE2C553650D77AA010DE49
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00410411: RegOpenKeyExA.KERNELBASE(00401C4B,00401C4B,00000000,00020019,?,00401C4B,?,?,?), ref: 00410424
                            • Part of subcall function 00410452: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C69,?,?,?,?,00401C69,?,?,?), ref: 0041046D
                            • Part of subcall function 0041042B: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00402928,?,?,?,?,00402928,?,?), ref: 0041044A
                            • Part of subcall function 00410475: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,0040264A,?), ref: 0041048B
                          • _mbscpy.MSVCRT ref: 00402EBC
                          • _mbscpy.MSVCRT ref: 00402ECF
                          • _mbscpy.MSVCRT ref: 00402F5C
                          • _mbscpy.MSVCRT ref: 00402F69
                          • RegCloseKey.ADVAPI32(?), ref: 00402FC3
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: _mbscpy$QueryValue$CloseOpen
                          • String ID: DisplayName$EmailAddress$PopAccount$PopLogSecure$PopPassword$PopPort$PopServer$SMTPAccount$SMTPLogSecure$SMTPPassword$SMTPPort$SMTPServer
                          • API String ID: 52435246-1534328989
                          • Opcode ID: 8606da5831358c67b4a99ee8b6ad117f72868ee6eb846870c269daa592ef00d8
                          • Instruction ID: 400a04a5c8efacb9c4641a70875855bf6b7e4888715d32951425251a7c23a99d
                          • Opcode Fuzzy Hash: 8606da5831358c67b4a99ee8b6ad117f72868ee6eb846870c269daa592ef00d8
                          • Instruction Fuzzy Hash: 575130B1900118BBEF11EB51DD41FEE777CAF04754F5080A7BA0CA6192DBB89B858F98
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: PrivateProfileString_mbscmpstrlen
                          • String ID: ESMTPPassword$ESMTPUsername$POP3Password$POP3Server$POP3Username$SMTPServer
                          • API String ID: 3963849919-1658304561
                          • Opcode ID: 2d5d1f6d072cf84e5318d5093311add326f10471678b07e4c74f475588d4acf4
                          • Instruction ID: 1b90a5eb0bf433dfd26fdc49de6d86aad9c02d214cf5b02dd481862667588e5e
                          • Opcode Fuzzy Hash: 2d5d1f6d072cf84e5318d5093311add326f10471678b07e4c74f475588d4acf4
                          • Instruction Fuzzy Hash: EF21F47180151C6EDB51EB11DD82FEE777C9B44705F4004ABBA09B1092DBBC6BC68E59
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??2@??3@memcpymemset
                          • String ID: E$ E$ E
                          • API String ID: 1865533344-1090515111
                          • Opcode ID: 9da058ee93427dafffafa38840fabb32167184d36f2f077627326be0874b02b0
                          • Instruction ID: 87a0be596659d04b7e64c8373dbe8b7d58709088cb568d7826d55e868489c559
                          • Opcode Fuzzy Hash: 9da058ee93427dafffafa38840fabb32167184d36f2f077627326be0874b02b0
                          • Instruction Fuzzy Hash: 0E115A74900209EFCF119F90C905AAE3BB1AF08312F00806AFC156B2A2C7799911DFAA
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00409EE6: SendMessageA.USER32(?,00001032,00000000,00000000), ref: 00409EFC
                          • OpenClipboard.USER32(?), ref: 0040C0A3
                            • Part of subcall function 00406C3D: EmptyClipboard.USER32 ref: 00406C45
                            • Part of subcall function 00406C3D: strlen.MSVCRT ref: 00406C52
                            • Part of subcall function 00406C3D: GlobalAlloc.KERNEL32(00002000,00000001,?,?,?,?,0040C0BB,?), ref: 00406C61
                            • Part of subcall function 00406C3D: GlobalFix.KERNEL32(00000000), ref: 00406C6E
                            • Part of subcall function 00406C3D: memcpy.MSVCRT ref: 00406C77
                            • Part of subcall function 00406C3D: GlobalUnWire.KERNEL32(00000000), ref: 00406C80
                            • Part of subcall function 00406C3D: SetClipboardData.USER32(00000001,00000000), ref: 00406C89
                            • Part of subcall function 00406C3D: CloseClipboard.USER32 ref: 00406C99
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: Clipboard$Global$AllocCloseDataEmptyMessageOpenSendWirememcpystrlen
                          • String ID:
                          • API String ID: 1720093512-0
                          • Opcode ID: d73fd5444aac2666192e8592cc429c06ee92b9a079e5d162064339f146911550
                          • Instruction ID: a897b5ee525c71a1d49f68bee22fe3fd46fa08075f7fd3a8f51c145daf979587
                          • Opcode Fuzzy Hash: d73fd5444aac2666192e8592cc429c06ee92b9a079e5d162064339f146911550
                          • Instruction Fuzzy Hash: 6FE08631104204E7EB10EBA6CD05A4BB3ACDF00704F10003AB451E3181DA78ED018658
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • strlen.MSVCRT ref: 0044269A
                          • _strncoll.MSVCRT ref: 004426AA
                          • memcpy.MSVCRT ref: 00442726
                          • atoi.MSVCRT ref: 00442737
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00000002,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00442763
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: ByteCharMultiWide_strncollatoimemcpystrlen
                          • String ID: AElig;$Aacute;$Acirc;$Agrave;$Aring;$Atilde;$Auml;$Ccedil;$ETH;$Eacute;$Ecirc;$Egrave;$Euml;$Iacute;$Icirc;$Igrave;$Iuml;$Ntilde;$Oacute;$Ocirc;$Ograve;$Oslash;$Otilde;$Ouml;$THORN;$Uacute;$Ucirc;$Ugrave;$Uuml;$Yacute;$aacute;$acirc;$acute;$aelig;$agrave;$amp;$apos;$aring;$atilde;$auml;$brvbar;$ccedil;$cedil;$cent;$copy;$curren;$deg;$divide;$eacute;$ecirc;$egrave;$eth;$euml;$frac12;$frac14;$frac34;$gt;$iacute;$icirc;$iexcl;$igrave;$iquest;$iuml;$laquo;$lt;$macr;$micro;$middot;$nbsp;$not;$ntilde;$oacute;$ocirc;$ograve;$ordf;$ordm;$oslash;$otilde;$ouml;$para;$plusmn;$pound;$quot;$raquo;$reg;$sect;$shy;$sup1;$sup2;$sup3;$szlig;$thorn;$times;$uacute;$ucirc;$ugrave;$uml;$uuml;$yacute;$yen;$yuml;
                          • API String ID: 1864335961-3210201812
                          • Opcode ID: 80ec9a29ea78ec2cbe9852ea9064bf10950e9091ede64f5a1b804a11a303e8fe
                          • Instruction ID: 53082eb74af2b51306e1b07bdc149dea26fd0daa9c3b29582cc647e8b6ddbc01
                          • Opcode Fuzzy Hash: 80ec9a29ea78ec2cbe9852ea9064bf10950e9091ede64f5a1b804a11a303e8fe
                          • Instruction Fuzzy Hash: 90F112B080625CDBFB61CF54D9897DEBBB0EB01308F5881CAD4597B251C7B81A89CF99
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: strcmp$_strcmpi$memcpystrlenstrtoul
                          • String ID: Account_Name$IMAP$IMAP_Port$IMAP_Secure_Connection$IMAP_Server$IMAP_User_Name$NNTP$NNTP_Email_Address$NNTP_Port$NNTP_Secure_Connection$NNTP_Server$NNTP_User_Name$POP3$POP3_Port$POP3_Secure_Connection$POP3_Server$POP3_User_Name$SMTP$SMTP_Email_Address$SMTP_Port$SMTP_Secure_Connection$SMTP_Server$SMTP_User_Name
                          • API String ID: 1714764973-479759155
                          • Opcode ID: a22eaacac348120a4584acb678e178257747be7cf0bf62b2cbe4dd5676c6cf3b
                          • Instruction ID: 5e0940cb4a553810ccd5eed58eee7b2aa7af7a3cc246567a3fd24b3687d2e464
                          • Opcode Fuzzy Hash: a22eaacac348120a4584acb678e178257747be7cf0bf62b2cbe4dd5676c6cf3b
                          • Instruction Fuzzy Hash: AD9191B260C7049AF628BB329D43B9B33D8AF50719F10043FF95AB61C2EE6DB905465D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memset.MSVCRT ref: 0040E6BB
                            • Part of subcall function 0040690E: memset.MSVCRT ref: 00406930
                            • Part of subcall function 0040690E: strlen.MSVCRT ref: 0040693B
                            • Part of subcall function 0040690E: strlen.MSVCRT ref: 00406949
                          • memset.MSVCRT ref: 0040E70C
                          • memset.MSVCRT ref: 0040E728
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,%@,000000FF,?,00000104,?,?,?,?,?,?,0040EC25,?,00000000), ref: 0040E73F
                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00000104,00000000,00000000,?,?,?,?,?,?,0040EC25,?), ref: 0040E75E
                          • memset.MSVCRT ref: 0040E7C0
                          • memset.MSVCRT ref: 0040E7D5
                          • _mbscpy.MSVCRT ref: 0040E83A
                          • _mbscpy.MSVCRT ref: 0040E850
                          • _mbscpy.MSVCRT ref: 0040E866
                          • _mbscpy.MSVCRT ref: 0040E87C
                          • _mbscpy.MSVCRT ref: 0040E892
                          • _mbscpy.MSVCRT ref: 0040E8A8
                          • memset.MSVCRT ref: 0040E8C2
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset$_mbscpy$ByteCharMultiWidestrlen
                          • String ID: $"$$$$$%@$+$,$/$8$:$e$imap://%s$mailbox://%s$smtp://%s
                          • API String ID: 3137614212-1813914204
                          • Opcode ID: 69a064d0c74a5f80a32c9514a74247ccae5cfcd5772a3df6081ef2e910daae95
                          • Instruction ID: 60cbd65c12865ccb94f157c96bc1922d811664869268201cbad442dfa9876f55
                          • Opcode Fuzzy Hash: 69a064d0c74a5f80a32c9514a74247ccae5cfcd5772a3df6081ef2e910daae95
                          • Instruction Fuzzy Hash: A9228E218087DA9DDB31D6BC9C456CDBF646B16234F0803DAF1E8BB2D2D7344A46CB66
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: _strcmpi$strlen$_strncoll$atoimemset$memcpy
                          • String ID: fullname$hostname$identities$mail.account.account$mail.identity$mail.server$port$server$signon.signonfilename$true$type$useSecAuth$useremail$username
                          • API String ID: 594115653-593045482
                          • Opcode ID: 02ac693aacd5f103a4b76259fedb339b3b15ca4c55630f2bd5c8a753d7842cac
                          • Instruction ID: 1e907043fac54bf2e371806c1eb24ba38ca233ac5dd260cadef0f6990961d541
                          • Opcode Fuzzy Hash: 02ac693aacd5f103a4b76259fedb339b3b15ca4c55630f2bd5c8a753d7842cac
                          • Instruction Fuzzy Hash: 3C71D832804204AEFF14ABA1DD02B9E77B5DF91329F21406FF545B21C1EB7D9A18D64C
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 0040690E: memset.MSVCRT ref: 00406930
                            • Part of subcall function 0040690E: strlen.MSVCRT ref: 0040693B
                            • Part of subcall function 0040690E: strlen.MSVCRT ref: 00406949
                            • Part of subcall function 004086A5: GetFileSize.KERNEL32(00000000,00000000,?,?,00000000,0040EC43,?,00000000,?,?,?,?,?,?), ref: 004086C3
                            • Part of subcall function 004086A5: CloseHandle.KERNEL32(?,?), ref: 0040870D
                            • Part of subcall function 00408763: _mbsicmp.MSVCRT ref: 0040879D
                          • memset.MSVCRT ref: 0040E123
                          • memset.MSVCRT ref: 0040E138
                          • _mbscpy.MSVCRT ref: 0040E19F
                          • _mbscpy.MSVCRT ref: 0040E1B5
                          • _mbscpy.MSVCRT ref: 0040E1CB
                          • _mbscpy.MSVCRT ref: 0040E1E1
                          • _mbscpy.MSVCRT ref: 0040E1F7
                          • _mbscpy.MSVCRT ref: 0040E20A
                          • memset.MSVCRT ref: 0040E225
                          • memset.MSVCRT ref: 0040E23C
                            • Part of subcall function 00406582: memset.MSVCRT ref: 004065A3
                            • Part of subcall function 00406582: memcmp.MSVCRT ref: 004065CD
                          • memset.MSVCRT ref: 0040E29D
                          • memset.MSVCRT ref: 0040E2B4
                          • memset.MSVCRT ref: 0040E2CB
                          • sprintf.MSVCRT ref: 0040E2E6
                          • sprintf.MSVCRT ref: 0040E2FB
                          • sprintf.MSVCRT ref: 0040E310
                          • _strcmpi.MSVCRT ref: 0040E326
                          • _strcmpi.MSVCRT ref: 0040E33F
                          • _strcmpi.MSVCRT ref: 0040E358
                          • _strcmpi.MSVCRT ref: 0040E374
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset$_mbscpy$_strcmpi$sprintf$strlen$CloseFileHandleSize_mbsicmpmemcmp
                          • String ID: C@$encryptedPassword$encryptedUsername$hostname$httpRealm$imap://%s$logins$mailbox://%s$passwordField$smtp://%s$usernameField
                          • API String ID: 4171719235-3249434271
                          • Opcode ID: b0d5c0670ed8c74d0c8e3b60901706fc2ec35adaa3e3620046f1bbd10783a5e2
                          • Instruction ID: 4eb083177fa9c3dcba641838e0e399a852ec85db15ddf69852980c8670b79128
                          • Opcode Fuzzy Hash: b0d5c0670ed8c74d0c8e3b60901706fc2ec35adaa3e3620046f1bbd10783a5e2
                          • Instruction Fuzzy Hash: EFA16672D04219AEDF10EBA1DC41ADE77BCAF44304F1044BFF645B7181DA38AA988F59
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetDlgItem.USER32(?,000003E9), ref: 0040FDA3
                          • GetDlgItem.USER32(?,000003E8), ref: 0040FDAF
                          • GetWindowLongA.USER32(00000000,000000F0), ref: 0040FDBE
                          • GetWindowLongA.USER32(?,000000F0), ref: 0040FDCA
                          • GetWindowLongA.USER32(00000000,000000EC), ref: 0040FDD3
                          • GetWindowLongA.USER32(?,000000EC), ref: 0040FDDF
                          • GetWindowRect.USER32(00000000,?), ref: 0040FDF1
                          • GetWindowRect.USER32(?,?), ref: 0040FDFC
                          • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0040FE10
                          • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0040FE1E
                          • 73BBAC50.USER32(?,?,?), ref: 0040FE57
                          • strlen.MSVCRT ref: 0040FE97
                          • GetTextExtentPoint32A.GDI32(?,00000000,00000000,?), ref: 0040FEA8
                          • sprintf.MSVCRT ref: 0040FFB5
                          • SetWindowTextA.USER32(?,?), ref: 0040FFC9
                          • SetWindowTextA.USER32(?,00000000), ref: 0040FFE7
                          • GetDlgItem.USER32(?,00000001), ref: 0041001D
                          • GetWindowRect.USER32(00000000,?), ref: 0041002D
                          • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041003B
                          • GetClientRect.USER32(?,?), ref: 00410052
                          • GetWindowRect.USER32(?,?), ref: 0041005C
                          • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 004100A2
                          • GetClientRect.USER32(?,?), ref: 004100AC
                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 004100E4
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32sprintfstrlen
                          • String ID: %s:$EDIT$STATIC
                          • API String ID: 2594924168-3046471546
                          • Opcode ID: 8a60e0ba97f171743a829e93ce0ff1a0e7cc565a63bc43af7584db32dade8b22
                          • Instruction ID: 60093129ffb9b10d71bc98ba01756b195f92c815bd96d79b3314cc8c80e42073
                          • Opcode Fuzzy Hash: 8a60e0ba97f171743a829e93ce0ff1a0e7cc565a63bc43af7584db32dade8b22
                          • Instruction Fuzzy Hash: 62B1DE71108741AFDB20DF68C985E6BBBE9FF88704F00492EF69992261DB75E804CF56
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memset.MSVCRT ref: 004024E7
                            • Part of subcall function 00410452: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C69,?,?,?,?,00401C69,?,?,?), ref: 0041046D
                          • _mbscpy.MSVCRT ref: 00402525
                          • _mbscpy.MSVCRT ref: 004025EF
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: _mbscpy$QueryValuememset
                          • String ID: HTTPMail$HTTPMail Port$HTTPMail Secure Connection$HTTPMail Server$HTTPMail User Name$IMAP$IMAP Port$IMAP Secure Connection$IMAP Server$IMAP User Name$POP3$POP3 Port$POP3 Secure Connection$POP3 Server$POP3 User Name$Password2$SMTP$SMTP Display Name$SMTP Email Address$SMTP Port$SMTP Secure Connection$SMTP Server$SMTP USer Name
                          • API String ID: 168965057-606283353
                          • Opcode ID: d04dcaea7970b63fee6828c7dcfe30098fc49b177350675b76886810d8c329c2
                          • Instruction ID: 01ace8319ffdb9fe87aab8cc910760b0be55d28e69d7af66dfccc1b3ad16f9ad
                          • Opcode Fuzzy Hash: d04dcaea7970b63fee6828c7dcfe30098fc49b177350675b76886810d8c329c2
                          • Instruction Fuzzy Hash: 815163B540161CEBEF20DF91DC85ADD7BACAF04318F50846BFA08A6142D7BD9584CF98
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memset.MSVCRT ref: 0040285B
                            • Part of subcall function 00402994: RegQueryValueExA.ADVAPI32(00000400,?,00000000,?,?,?), ref: 004029C5
                          • _mbscpy.MSVCRT ref: 00402895
                            • Part of subcall function 00402994: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004029F3
                          • _mbscpy.MSVCRT ref: 0040296D
                            • Part of subcall function 0041042B: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00402928,?,?,?,?,00402928,?,?), ref: 0041044A
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: QueryValue_mbscpy$ByteCharMultiWidememset
                          • String ID: Display Name$Email$HTTP$HTTP Port$HTTP Server URL$HTTP User$HTTPMail Use SSL$IMAP$IMAP Port$IMAP Server$IMAP Use SPA$IMAP User$POP3$POP3 Port$POP3 Server$POP3 Use SPA$POP3 User$Password$SMTP$SMTP Port$SMTP Server$SMTP Use SSL$SMTP User
                          • API String ID: 1497257669-167382505
                          • Opcode ID: fb3ed3ae92ef97c750fd38775156bd4655232a824b152189a5320ea8a9642570
                          • Instruction ID: 24fe9e335227be75b4da69fc4be99485a809f42695e36ab36f90f83f1315ab2f
                          • Opcode Fuzzy Hash: fb3ed3ae92ef97c750fd38775156bd4655232a824b152189a5320ea8a9642570
                          • Instruction Fuzzy Hash: 22514DB150060C9BEF25EF61DC85ADD7BA8FF04308F50802BF924661A2DBB99958CF48
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • EndDialog.USER32(?,?), ref: 0040F600
                          • GetDlgItem.USER32(?,000003EA), ref: 0040F618
                          • SendMessageA.USER32(00000000,000000B1,00000000,0000FFFF), ref: 0040F637
                          • SendMessageA.USER32(?,00000301,00000000,00000000), ref: 0040F644
                          • SendMessageA.USER32(?,000000B1,00000000,00000000), ref: 0040F64D
                          • memset.MSVCRT ref: 0040F675
                          • memset.MSVCRT ref: 0040F695
                          • memset.MSVCRT ref: 0040F6B3
                          • memset.MSVCRT ref: 0040F6CC
                          • memset.MSVCRT ref: 0040F6EA
                          • memset.MSVCRT ref: 0040F703
                          • GetCurrentProcess.KERNEL32 ref: 0040F70B
                          • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0040F730
                          • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0040F766
                          • memset.MSVCRT ref: 0040F7BD
                          • GetCurrentProcessId.KERNEL32 ref: 0040F7CB
                          • memcpy.MSVCRT ref: 0040F7FA
                          • _mbscpy.MSVCRT ref: 0040F81C
                          • sprintf.MSVCRT ref: 0040F887
                          • SetDlgItemTextA.USER32(?,000003EA,?), ref: 0040F8A0
                          • GetDlgItem.USER32(?,000003EA), ref: 0040F8AA
                          • SetFocus.USER32(00000000), ref: 0040F8B1
                          Strings
                          • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X ESP=%8.8XEIP=%8.8XStack Data: %sCode Data: %s, xrefs: 0040F881
                          • {Unknown}, xrefs: 0040F67A
                          • u, xrefs: 0040F8B1
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_mbscpymemcpysprintf
                          • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X ESP=%8.8XEIP=%8.8XStack Data: %sCode Data: %s$u${Unknown}
                          • API String ID: 1428123949-2294669797
                          • Opcode ID: b9341adbc2cd016ad37feae7563ea95aa4c33f034ac246c3141dbd5b744c5ef9
                          • Instruction ID: eaf6f4841f79e9ca67ab0c8a61f7093b44a411cbafad24e33deb6097971d8b5c
                          • Opcode Fuzzy Hash: b9341adbc2cd016ad37feae7563ea95aa4c33f034ac246c3141dbd5b744c5ef9
                          • Instruction Fuzzy Hash: 4271B576404344BFEB31ABA0DC41EDB7B9CFB94345F00443AF644A25A1DB399D18CB6A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetDlgItem.USER32(?,000003EC), ref: 004010BC
                          • ChildWindowFromPoint.USER32(?,?,?), ref: 004010CE
                          • GetDlgItem.USER32(?,000003EE), ref: 00401103
                          • ChildWindowFromPoint.USER32(?,?,?), ref: 00401110
                          • GetDlgItem.USER32(?,000003EC), ref: 0040113E
                          • ChildWindowFromPoint.USER32(?,?,?), ref: 00401150
                          • LoadCursorA.USER32(00000067), ref: 0040115F
                          • SetCursor.USER32(00000000,?,?), ref: 00401166
                          • GetDlgItem.USER32(?,000003EE), ref: 00401186
                          • ChildWindowFromPoint.USER32(?,?,?), ref: 00401193
                          • GetDlgItem.USER32(?,000003EC), ref: 004011AD
                          • SetBkMode.GDI32(?,00000001), ref: 004011B9
                          • SetTextColor.GDI32(?,00C00000), ref: 004011C7
                          • GetSysColorBrush.USER32(0000000F), ref: 004011CF
                          • GetDlgItem.USER32(?,000003EE), ref: 004011EF
                          • EndDialog.USER32(?,00000001), ref: 0040121A
                          • DeleteObject.GDI32(?), ref: 00401226
                          • GetDlgItem.USER32(?,000003ED), ref: 0040124A
                          • ShowWindow.USER32(00000000), ref: 00401253
                          • GetDlgItem.USER32(?,000003EE), ref: 0040125F
                          • ShowWindow.USER32(00000000), ref: 00401262
                          • SetDlgItemTextA.USER32(?,000003EE,00451398), ref: 00401273
                          • memset.MSVCRT ref: 0040128E
                          • SetWindowTextA.USER32(?,00000000), ref: 004012AA
                          • SetDlgItemTextA.USER32(?,000003EA,?), ref: 004012C2
                          • SetDlgItemTextA.USER32(?,000003EC,?), ref: 004012D3
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogLoadModeObjectmemset
                          • String ID:
                          • API String ID: 2998058495-0
                          • Opcode ID: 0f9c4242ba45eb06dd3dfa1dd6db45fade88f32ef90b46f4d12f3d9a9e08a6d1
                          • Instruction ID: cf74e5707885198988a29297af0a26d915b41f86d4ff93bb74c60bb1bb3fb963
                          • Opcode Fuzzy Hash: 0f9c4242ba45eb06dd3dfa1dd6db45fade88f32ef90b46f4d12f3d9a9e08a6d1
                          • Instruction Fuzzy Hash: 04618B35800208EBDF12AFA0DD85BAE7FA5BB04305F1481B6F904BA2F2C7B59950DF58
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00408DE1: LoadMenuA.USER32(00000000), ref: 00408DE9
                            • Part of subcall function 00408DE1: sprintf.MSVCRT ref: 00408E0C
                          • SetMenu.USER32(?,00000000), ref: 0040BA7E
                          • SendMessageA.USER32(00000000,00000404,00000001,?), ref: 0040BAB1
                          • LoadImageA.USER32(00000068,00000000,00000000,00000000,00009060), ref: 0040BAC7
                          • CreateWindowExA.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000), ref: 0040BB27
                          • LoadIconA.USER32(00000066,00000000), ref: 0040BB96
                          • _strcmpi.MSVCRT ref: 0040BBEE
                          • RegDeleteKeyA.ADVAPI32(80000001,0044551F), ref: 0040BC03
                          • SetFocus.USER32(?), ref: 0040BC29
                          • GetFileAttributesA.KERNEL32(004518C0), ref: 0040BC42
                          • GetTempPathA.KERNEL32(00000104,004518C0), ref: 0040BC52
                          • strlen.MSVCRT ref: 0040BC59
                          • strlen.MSVCRT ref: 0040BC67
                          • RegisterClipboardFormatA.USER32(commdlg_FindReplace), ref: 0040BCC3
                            • Part of subcall function 00404B82: strlen.MSVCRT ref: 00404B9F
                            • Part of subcall function 00404B82: SendMessageA.USER32(00000000,0000101B,00000000,?), ref: 00404BC3
                          • SendMessageA.USER32(?,00000404,00000002,?), ref: 0040BD0E
                          • SendMessageA.USER32(?,00000401,00001001,00000000), ref: 0040BD21
                          • memset.MSVCRT ref: 0040BD36
                          • SetWindowTextA.USER32(?,?), ref: 0040BD5A
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: MessageSend$Loadstrlen$MenuWindow$AttributesClipboardCreateDeleteFileFocusFormatIconImagePathRegisterTempText_strcmpimemsetsprintf
                          • String ID: /noloadsettings$SysListView32$commdlg_FindReplace$report.html$u
                          • API String ID: 2303586283-3958168634
                          • Opcode ID: bc2ea265da4b9d7fbf42eb82516b20c9e5d99f5c25abf20ff2f7a7fba55c6b61
                          • Instruction ID: a3034197930a53117d85b49231bdaaa03d04473d70278c5121b5a691f959c143
                          • Opcode Fuzzy Hash: bc2ea265da4b9d7fbf42eb82516b20c9e5d99f5c25abf20ff2f7a7fba55c6b61
                          • Instruction Fuzzy Hash: 13C1E0B1644788FFEB16DF64CC45BDABBA5FF14304F00016AFA44AB292C7B59904CB99
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: _mbscat$memsetsprintf$_mbscpy
                          • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                          • API String ID: 633282248-1996832678
                          • Opcode ID: d48ae4295fbb277336b7674ab4026529653ef1736987acc8de4e4bffa9c8da66
                          • Instruction ID: 7c6bf41bc1280a1bc88d4c6d4cc59bc6a86d5934fc3475aca932ea250c86fdc0
                          • Opcode Fuzzy Hash: d48ae4295fbb277336b7674ab4026529653ef1736987acc8de4e4bffa9c8da66
                          • Instruction Fuzzy Hash: 5E31E7B2805324BEFB14EA54DD42EDEB76CAF11354F20415FF214A2182DBBC9ED48A9D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memsetsprintf$_mbscpy$FileWrite_mbscatstrlen
                          • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                          • API String ID: 710961058-601624466
                          • Opcode ID: 6b5a2a585f50ca3eac413cecb2812d02d42192bb924b4e36303969acff340374
                          • Instruction ID: 74eb9a4e80b6148bc8e6745fd37c56fddd23ac0c0a2d0b32ddfd32f18a43723b
                          • Opcode Fuzzy Hash: 6b5a2a585f50ca3eac413cecb2812d02d42192bb924b4e36303969acff340374
                          • Instruction Fuzzy Hash: BC61B232900214AFEF14EF64CC81EDE7B79EF05314F10419AF905AB1D2DB749A55CB55
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: sprintf$memset$_mbscpy
                          • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                          • API String ID: 3402215030-3842416460
                          • Opcode ID: 17ed6d14846e4c5c10a4de3d65ab3a3dc687bb0adce687871bc2f7fa502a4f2e
                          • Instruction ID: 369df5ceca9bdb9f61db2c44a96b4e719fee50907ea6fa1c749cf0cc9e3d70a7
                          • Opcode Fuzzy Hash: 17ed6d14846e4c5c10a4de3d65ab3a3dc687bb0adce687871bc2f7fa502a4f2e
                          • Instruction Fuzzy Hash: CC4176B684011DAEEB11EE54DC41FEB776CAF55305F0401EBB608E2142E7789F988FA9
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memcmp$memcpy
                          • String ID: %s mode not allowed: %s$BINARY$access$cache$file:$invalid uri authority: %.*s$localhost$mode$no such %s mode: %s$no such vfs: %s$vfs
                          • API String ID: 231171946-1411472696
                          • Opcode ID: ee0957bba9a21b500f81e6c25a2f981e0bf1c959c719be955f11db3b2c6e13f4
                          • Instruction ID: 52e3131474fa5b42b7a716d11f9a5693575ad96a685679239bae0d8a086cc604
                          • Opcode Fuzzy Hash: ee0957bba9a21b500f81e6c25a2f981e0bf1c959c719be955f11db3b2c6e13f4
                          • Instruction Fuzzy Hash: 6ED13571D40209AAFF24CF99C8807EFBBB1AF15349F24405FE84197361E3789AC68B59
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: _mbscpy$FileModuleNamePlacementWindow_mbscatmemsetstrrchr
                          • String ID: .cfg$AddExportHeaderLine$General$MarkOddEvenRows$SaveFilterIndex$ShowGridLines$WinPos$lD
                          • API String ID: 1012775001-1916105108
                          • Opcode ID: 122b63003726a974bfadc130288c83bc1cbd12b8fd6105304b92718d22d06189
                          • Instruction ID: 0f0ca2c9629047d536013ad0a00a476c63862c7e4230734d296e8a5f64e20069
                          • Opcode Fuzzy Hash: 122b63003726a974bfadc130288c83bc1cbd12b8fd6105304b92718d22d06189
                          • Instruction Fuzzy Hash: 41415A72940118ABDB20DB54CC88FDAB7BCAB59300F4541EAF50DE7192DA74AA858FA4
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 004078B8: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040EAAB,?,?,?,?), ref: 004078D1
                            • Part of subcall function 004078B8: CloseHandle.KERNEL32(00000000,?,?,?), ref: 004078FD
                            • Part of subcall function 004045BD: ??3@YAXPAX@Z.MSVCRT ref: 004045C4
                            • Part of subcall function 00406DD3: _mbscpy.MSVCRT ref: 00406DD8
                            • Part of subcall function 00406DD3: strrchr.MSVCRT ref: 00406DE0
                            • Part of subcall function 0040D7EA: memset.MSVCRT ref: 0040D80B
                            • Part of subcall function 0040D7EA: memset.MSVCRT ref: 0040D81F
                            • Part of subcall function 0040D7EA: memset.MSVCRT ref: 0040D833
                            • Part of subcall function 0040D7EA: memcpy.MSVCRT ref: 0040D900
                            • Part of subcall function 0040D7EA: memcpy.MSVCRT ref: 0040D960
                          • strlen.MSVCRT ref: 0040EAF0
                          • strlen.MSVCRT ref: 0040EAFE
                          • memset.MSVCRT ref: 0040EB3F
                          • strlen.MSVCRT ref: 0040EB4E
                          • strlen.MSVCRT ref: 0040EB5C
                          • memset.MSVCRT ref: 0040EB9D
                          • strlen.MSVCRT ref: 0040EBAC
                          • strlen.MSVCRT ref: 0040EBBA
                          • _strcmpi.MSVCRT ref: 0040EC68
                          • _mbscpy.MSVCRT ref: 0040EC83
                            • Part of subcall function 00406E81: _mbscpy.MSVCRT ref: 00406E89
                            • Part of subcall function 00406E81: _mbscat.MSVCRT ref: 00406E98
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: strlen$memset$_mbscpy$memcpy$??3@CloseFileHandleSize_mbscat_strcmpistrrchr
                          • String ID: logins.json$none$signons.sqlite$signons.txt
                          • API String ID: 3884059725-3138536805
                          • Opcode ID: c5b9952702cbd755305f6f4c2c58a42ef73f51976a5d7d3736a15114e020422c
                          • Instruction ID: df88ffc6541641ac30fc10f5b0fca58fec5c07c4b1c9a15943a758993f488c50
                          • Opcode Fuzzy Hash: c5b9952702cbd755305f6f4c2c58a42ef73f51976a5d7d3736a15114e020422c
                          • Instruction Fuzzy Hash: 2D512971508209AEE714EB62DC85BDAB7ECAF11305F10057BE145E20C2EF79B6648B99
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: _strcmpi
                          • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                          • API String ID: 1439213657-1959339147
                          • Opcode ID: 77925ccb47b99d7184ab421125f296c84d7d33a23461460fa00f3fd3e52541e8
                          • Instruction ID: 4795e8c1a20e30d0c9bbc9b6431cc8fe1bf434ed6b151c21ba544f3180274443
                          • Opcode Fuzzy Hash: 77925ccb47b99d7184ab421125f296c84d7d33a23461460fa00f3fd3e52541e8
                          • Instruction Fuzzy Hash: 89012C6328A71168F93822A63C07F931A88CBD2B3BF32021FFA04E40C4EE5D9014946E
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memset.MSVCRT ref: 00443AF6
                            • Part of subcall function 00443946: strlen.MSVCRT ref: 00443953
                          • strlen.MSVCRT ref: 00443B12
                          • memset.MSVCRT ref: 00443B4C
                          • memset.MSVCRT ref: 00443B60
                          • memset.MSVCRT ref: 00443B74
                          • memset.MSVCRT ref: 00443B9A
                            • Part of subcall function 0040CF27: memcpy.MSVCRT ref: 0040CFB8
                            • Part of subcall function 0040CFC5: memset.MSVCRT ref: 0040CFE4
                            • Part of subcall function 0040CFC5: memset.MSVCRT ref: 0040CFFA
                            • Part of subcall function 0040CFC5: memcpy.MSVCRT ref: 0040D031
                            • Part of subcall function 0040CFC5: memset.MSVCRT ref: 0040D03B
                          • memcpy.MSVCRT ref: 00443BD1
                            • Part of subcall function 0040CF27: memcpy.MSVCRT ref: 0040CF6A
                            • Part of subcall function 0040CF27: memcpy.MSVCRT ref: 0040CF94
                            • Part of subcall function 0040CFC5: memset.MSVCRT ref: 0040D00C
                          • memcpy.MSVCRT ref: 00443C0D
                          • memcpy.MSVCRT ref: 00443C1F
                          • _mbscpy.MSVCRT ref: 00443CF6
                          • memcpy.MSVCRT ref: 00443D27
                          • memcpy.MSVCRT ref: 00443D39
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memcpymemset$strlen$_mbscpy
                          • String ID: salu
                          • API String ID: 3691931180-4177317985
                          • Opcode ID: cfd6af14ea326c76b81993dcf2b8da589751f80de7e5c424798678831997877e
                          • Instruction ID: ac1bd25895dca9443f5d295c1451dfd6054ecd25aeec11951aea85171a240119
                          • Opcode Fuzzy Hash: cfd6af14ea326c76b81993dcf2b8da589751f80de7e5c424798678831997877e
                          • Instruction Fuzzy Hash: E1715F7290011DAADB10EFA5CC81ADEB7BDBF08348F1405BAF648E7191DB749B488F95
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • SetBkMode.GDI32(?,00000001), ref: 0040C7C9
                          • SetTextColor.GDI32(?,00FF0000), ref: 0040C7D7
                          • SelectObject.GDI32(?,?), ref: 0040C7EC
                          • DrawTextExA.USER32(?,?,000000FF,?,00000004,?), ref: 0040C821
                          • SelectObject.GDI32(00000014,?), ref: 0040C82D
                            • Part of subcall function 0040C586: GetCursorPos.USER32(?), ref: 0040C593
                            • Part of subcall function 0040C586: GetSubMenu.USER32(?,00000000), ref: 0040C5A1
                            • Part of subcall function 0040C586: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0040C5CE
                          • LoadCursorA.USER32(00000067), ref: 0040C84E
                          • SetCursor.USER32(00000000), ref: 0040C855
                          • PostMessageA.USER32(?,0000041C,00000000,00000000), ref: 0040C877
                          • SetFocus.USER32(?), ref: 0040C8B2
                          • SetFocus.USER32(?), ref: 0040C92B
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: Cursor$FocusMenuObjectSelectText$ColorDrawLoadMessageModePopupPostTrack
                          • String ID: u
                          • API String ID: 1416211542-4067256894
                          • Opcode ID: 72d4e56ce9792ca9f6f5468ccb6de1f9c3d453dee6bcce5964bd40597cc99410
                          • Instruction ID: 09ccc7060a79f4adaf8e2edad657e89b5ff3622033c15eab8e38028839dfd0e9
                          • Opcode Fuzzy Hash: 72d4e56ce9792ca9f6f5468ccb6de1f9c3d453dee6bcce5964bd40597cc99410
                          • Instruction Fuzzy Hash: 4E518276200605EFCB15AF64CCC5AAA77A5FB08302F004636F616B72A1CB39A951DB9D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • LoadLibraryA.KERNEL32(psapi.dll,?,0040F791), ref: 0040F9BF
                          • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameA), ref: 0040F9D8
                          • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 0040F9E9
                          • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExA), ref: 0040F9FA
                          • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 0040FA0B
                          • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 0040FA1C
                          • FreeLibrary.KERNEL32(00000000), ref: 0040FA3C
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: AddressProc$Library$FreeLoad
                          • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameA$GetModuleFileNameExA$GetModuleInformation$psapi.dll
                          • API String ID: 2449869053-232097475
                          • Opcode ID: 41a7431a570a879339345957c21e7bbc60c6881d878c9e33f6f290671b5569e0
                          • Instruction ID: b0622ab91b6b15bab8cd8e6e0f6310f6235a52dd738245c008a901a401bb443a
                          • Opcode Fuzzy Hash: 41a7431a570a879339345957c21e7bbc60c6881d878c9e33f6f290671b5569e0
                          • Instruction Fuzzy Hash: C6017574A41315ABDB31DB256D41F6B2DE49786B41B100037F808F16A5E7B8D806CF6D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00404666: _mbscpy.MSVCRT ref: 004046B5
                            • Part of subcall function 0040472F: LoadLibraryA.KERNELBASE(?,0040F08A,?,00000000), ref: 00404737
                            • Part of subcall function 0040472F: GetProcAddress.KERNEL32(00000000,?), ref: 0040474F
                          • strlen.MSVCRT ref: 00442FBF
                          • ??2@YAPAXI@Z.MSVCRT ref: 00442FCF
                          • memset.MSVCRT ref: 0044301B
                          • memset.MSVCRT ref: 00443038
                          • _mbscpy.MSVCRT ref: 00443066
                          • RegCloseKey.ADVAPI32(?), ref: 004430AA
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,000000FF,00000000,00000000,?,?,?), ref: 004430FB
                          • LocalFree.KERNEL32(?), ref: 00443110
                          • ??3@YAXPAX@Z.MSVCRT ref: 00443119
                            • Part of subcall function 0040710B: strtoul.MSVCRT ref: 00407113
                          Strings
                          • Software\Microsoft\Windows Live Mail, xrefs: 0044305A
                          • Salt, xrefs: 00443094
                          • Software\Microsoft\Windows Mail, xrefs: 0044304E
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: _mbscpymemset$??2@??3@AddressByteCharCloseFreeLibraryLoadLocalMultiProcWidestrlenstrtoul
                          • String ID: Salt$Software\Microsoft\Windows Live Mail$Software\Microsoft\Windows Mail
                          • API String ID: 665470638-2687544566
                          • Opcode ID: c7be1d339a6f71acec12681967ad21d50f91be88715435c981d713b1c9f5c6b3
                          • Instruction ID: f7bf93f0836b67bba3c835e38737b5ae5122e901c23063e01546d75898481f5a
                          • Opcode Fuzzy Hash: c7be1d339a6f71acec12681967ad21d50f91be88715435c981d713b1c9f5c6b3
                          • Instruction Fuzzy Hash: F7417676C0411CAEDB11DFE4DC81EDEBBBCAF49314F1441ABE644E3242DA349A44CB69
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • RegOpenKeyExA.ADVAPI32(0040F591,Creds,00000000,00020019,0040F591,%GKP$^%^&LL(%^$^O&TR$^%^GV6;lxzd,00000040,?,?,0040F591,?,?,?,?), ref: 0040F1A1
                          • memset.MSVCRT ref: 0040F1BF
                          • RegOpenKeyExA.ADVAPI32(?,?,00000000,00020019,?), ref: 0040F1EC
                          • RegQueryValueExA.ADVAPI32(?,ps:password,00000000,?), ref: 0040F215
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,000000FF,00000000,00000000), ref: 0040F28E
                          • LocalFree.KERNEL32(?), ref: 0040F2A1
                          • RegCloseKey.ADVAPI32(?), ref: 0040F2AC
                          • RegEnumKeyA.ADVAPI32(?,00000000,?,000000FF), ref: 0040F2C3
                          • RegCloseKey.ADVAPI32(?), ref: 0040F2D4
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: CloseOpen$ByteCharEnumFreeLocalMultiQueryValueWidememset
                          • String ID: %GKP$^%^&LL(%^$^O&TR$^%^GV6;lxzd$Creds$ps:password
                          • API String ID: 551151806-1288872324
                          • Opcode ID: 99828ca7f35a41181d9bb96a9a02e43887c925b3765608a693f25377290640c0
                          • Instruction ID: 6090246ec9a09cf2b7bf1ee2c59d5b558b26d9adbf6fbfd3eb8a6f02fd62f1f0
                          • Opcode Fuzzy Hash: 99828ca7f35a41181d9bb96a9a02e43887c925b3765608a693f25377290640c0
                          • Instruction Fuzzy Hash: D7413ABA900209AFDF21DF95DC44EEFBBBCEF49704F0000B6F905E2151DA349A548B64
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00406AD1: strlen.MSVCRT ref: 00406ADE
                            • Part of subcall function 00406AD1: WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,0040A8D9,?,<item>), ref: 00406AEB
                          • memset.MSVCRT ref: 00403EBB
                          • memset.MSVCRT ref: 00403ECF
                          • memset.MSVCRT ref: 00403EE3
                          • sprintf.MSVCRT ref: 00403F04
                          • _mbscpy.MSVCRT ref: 00403F20
                          • sprintf.MSVCRT ref: 00403F57
                          • sprintf.MSVCRT ref: 00403F88
                          Strings
                          • <br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>, xrefs: 00403F82
                          • <table dir="rtl"><tr><td>, xrefs: 00403F1A
                          • <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">, xrefs: 00403E93
                          • <html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>, xrefs: 00403F32
                          • <meta http-equiv='content-type' content='text/html;charset=%s'>, xrefs: 00403EFE
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memsetsprintf$FileWrite_mbscpystrlen
                          • String ID: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">$<br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>$<html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>$<meta http-equiv='content-type' content='text/html;charset=%s'>$<table dir="rtl"><tr><td>
                          • API String ID: 113626815-1670831295
                          • Opcode ID: e988a86f96cb0b35651706e8a54da2f8db7d6407d8c8c481c34fbc63b9ba1f92
                          • Instruction ID: 806bb3af6c01162091129d7dbd14bcfdd9389eda619bfd821539a1a2e53cd61a
                          • Opcode Fuzzy Hash: e988a86f96cb0b35651706e8a54da2f8db7d6407d8c8c481c34fbc63b9ba1f92
                          • Instruction Fuzzy Hash: 553187B2944218BAEB10EB95CC41FDF77ACEB44305F1040ABF609A3141DE789F988B69
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • EmptyClipboard.USER32 ref: 00406BA4
                            • Part of subcall function 00406A9F: CreateFileA.KERNEL32(R7D,80000000,00000001,00000000,00000003,00000000,00000000,0044368E,?,.8D,00443752,?,?,*.oeaccount,.8D,?), ref: 00406AB1
                          • GetFileSize.KERNEL32(00000000,00000000), ref: 00406BC1
                          • GlobalAlloc.KERNEL32(00002000,00000001), ref: 00406BD2
                          • GlobalFix.KERNEL32(00000000), ref: 00406BDF
                          • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00406BF2
                          • GlobalUnWire.KERNEL32(00000000), ref: 00406C01
                          • SetClipboardData.USER32(00000001,00000000), ref: 00406C0A
                          • GetLastError.KERNEL32 ref: 00406C12
                          • CloseHandle.KERNEL32(?), ref: 00406C1E
                          • GetLastError.KERNEL32 ref: 00406C29
                          • CloseClipboard.USER32 ref: 00406C32
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: ClipboardFileGlobal$CloseErrorLast$AllocCreateDataEmptyHandleReadSizeWire
                          • String ID: t
                          • API String ID: 2565263379-2238339752
                          • Opcode ID: 1b6e565173029c6444be00b6b2d36f782b825a097f2130a1a97e673a6d3a71af
                          • Instruction ID: 428d7c431cb1422a1915013c6704b220f4cf118cce9454ff27e0024ace88079b
                          • Opcode Fuzzy Hash: 1b6e565173029c6444be00b6b2d36f782b825a097f2130a1a97e673a6d3a71af
                          • Instruction Fuzzy Hash: E2114239904605FFEF105FA4DC4CB9E7FB8EB46755F104035F542E1192DB7489508A69
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetModuleHandleA.KERNEL32(kernel32.dll,?,0040F798), ref: 0040F937
                          • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 0040F950
                          • GetProcAddress.KERNEL32(00000000,Module32First), ref: 0040F961
                          • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 0040F972
                          • GetProcAddress.KERNEL32(00000000,Process32First), ref: 0040F983
                          • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 0040F994
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: AddressProc$HandleModule
                          • String ID: CreateToolhelp32Snapshot$Module32First$Module32Next$Process32First$Process32Next$kernel32.dll
                          • API String ID: 667068680-3953557276
                          • Opcode ID: f969084aaa60d6fc347aca6cd4b103efb280d70b1424ed757b2f63fa67c010da
                          • Instruction ID: d70ca51da7794723d6fdd3b52e2ca510f6325bc6d96353a7ae51ff6a4d6706bc
                          • Opcode Fuzzy Hash: f969084aaa60d6fc347aca6cd4b103efb280d70b1424ed757b2f63fa67c010da
                          • Instruction Fuzzy Hash: E5F03674641716BEE7219B35EC41F6B2DA8B786B817150037E404F1295EBBCD406CBEE
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00404651: FreeLibrary.KERNEL32(?,004045DE,?,0040F07D,?,00000000), ref: 00404658
                          • LoadLibraryA.KERNEL32(advapi32.dll,?,0040F07D,?,00000000), ref: 004045E3
                          • GetProcAddress.KERNEL32(00000000,CredReadA), ref: 004045FC
                          • GetProcAddress.KERNEL32(?,CredFree), ref: 00404608
                          • GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404614
                          • GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404620
                          • GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 0040462C
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: AddressProc$Library$FreeLoad
                          • String ID: CredDeleteA$CredEnumerateA$CredEnumerateW$CredFree$CredReadA$advapi32.dll
                          • API String ID: 2449869053-4258758744
                          • Opcode ID: cdcbb80234758e29e10a2fa45a01471a6c512abbbeef489e8d79757fa0f5749b
                          • Instruction ID: e667573ab02a3a36113e5811d7d9d25958220871e4fc9ad39742c7b975dc30ca
                          • Opcode Fuzzy Hash: cdcbb80234758e29e10a2fa45a01471a6c512abbbeef489e8d79757fa0f5749b
                          • Instruction Fuzzy Hash: 32012CB49007009ADB30AF759809B46BAE0EF9A705B224C2FE295A3691E77ED440CF49
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • wcsstr.MSVCRT ref: 0040424C
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 00404293
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042A7
                          • _mbscpy.MSVCRT ref: 004042B7
                          • _mbscpy.MSVCRT ref: 004042CA
                          • strchr.MSVCRT ref: 004042D8
                          • strlen.MSVCRT ref: 004042EC
                          • sprintf.MSVCRT ref: 0040430D
                          • strchr.MSVCRT ref: 0040431E
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: ByteCharMultiWide_mbscpystrchr$sprintfstrlenwcsstr
                          • String ID: %s@gmail.com$www.google.com
                          • API String ID: 3866421160-4070641962
                          • Opcode ID: 1db7f9bf2b70e86dd11ed3dbd874db975a9752dd457c4b53029e5acecafbc8af
                          • Instruction ID: 638e790b5603b8fd8804fb5d4b15941c8435a10b684d18614d662d2844f21a3d
                          • Opcode Fuzzy Hash: 1db7f9bf2b70e86dd11ed3dbd874db975a9752dd457c4b53029e5acecafbc8af
                          • Instruction Fuzzy Hash: A53195B290421CBFEB11DB91DC81FDAB36CEB44314F1005A7F708F2181DA78AF558A59
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • _mbscpy.MSVCRT ref: 004094BA
                          • _mbscpy.MSVCRT ref: 004094CA
                            • Part of subcall function 0040907D: memset.MSVCRT ref: 004090A2
                            • Part of subcall function 0040907D: GetPrivateProfileStringA.KERNEL32(00451308,?,0044551F,?,00001000,00451200), ref: 004090C6
                            • Part of subcall function 0040907D: WritePrivateProfileStringA.KERNEL32(00451308,?,?,00451200), ref: 004090DD
                          • EnumResourceNamesA.KERNEL32(?,00000004,Function_000092CB,00000000), ref: 00409500
                          • EnumResourceNamesA.KERNEL32(?,00000005,Function_000092CB,00000000), ref: 0040950A
                          • _mbscpy.MSVCRT ref: 00409512
                          • memset.MSVCRT ref: 0040952E
                          • LoadStringA.USER32(?,00000000,?,00001000), ref: 00409542
                            • Part of subcall function 004090EB: _itoa.MSVCRT ref: 0040910C
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: String_mbscpy$EnumNamesPrivateProfileResourcememset$LoadWrite_itoa
                          • String ID: TranslatorName$TranslatorURL$general$strings
                          • API String ID: 1035899707-3647959541
                          • Opcode ID: 97e9d8764d44d496b522761866ccd9ae9dc7e38aa88f3c298a62bf6b22ba0dc4
                          • Instruction ID: 9dc8dfcbefe26b31ead3ecdd6c1d49ac828ce4ba7b4c08f8d1d1c72bb5e2ee9a
                          • Opcode Fuzzy Hash: 97e9d8764d44d496b522761866ccd9ae9dc7e38aa88f3c298a62bf6b22ba0dc4
                          • Instruction Fuzzy Hash: A6112B7190025476F73127169C06FDB3E5CDF86B96F00407BBB08B61D3C6B94D40866D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: _mbscpy
                          • String ID: AppData$Common Desktop$Common Programs$Common Start Menu$Common Startup$Desktop$Favorites$Programs$Start Menu$Startup
                          • API String ID: 714388716-318151290
                          • Opcode ID: 0a525b84c5f9161c47f62fe334daf8b9de5718508579850184da69b323b5bb64
                          • Instruction ID: 9896847eb90bf5c4294a3c9dccddd80cbc36a64f1d49de08ffe9e6d9729d10b2
                          • Opcode Fuzzy Hash: 0a525b84c5f9161c47f62fe334daf8b9de5718508579850184da69b323b5bb64
                          • Instruction Fuzzy Hash: 5CF054B1BA870D60343C0528088EAF715009463B453764627F222E05DECEEDBCD26C0F
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: _strcmpi_strnicmpmemsetsprintf$strlen
                          • String ID: imap://$imap://%s@%s$mailbox://$mailbox://%s@%s
                          • API String ID: 2360744853-2229823034
                          • Opcode ID: 6cd9f616e22569c22ee97f1c282593b0608afcf1e5c6b77fef8cec6df374adea
                          • Instruction ID: 5d143ff0da15214bab7bb06cf5d8f907292877c2fd7590e182fa264530f008e8
                          • Opcode Fuzzy Hash: 6cd9f616e22569c22ee97f1c282593b0608afcf1e5c6b77fef8cec6df374adea
                          • Instruction Fuzzy Hash: 934185726053059FE724DEA5C881F9673E8EF04304F10497BF64AE3281DB78F9588B59
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00410411: RegOpenKeyExA.KERNELBASE(00401C4B,00401C4B,00000000,00020019,?,00401C4B,?,?,?), ref: 00410424
                          • memset.MSVCRT ref: 00402C8F
                            • Part of subcall function 004104D7: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 004104FA
                          • RegCloseKey.ADVAPI32(?), ref: 00402D91
                            • Part of subcall function 00410493: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 004104CC
                          • memset.MSVCRT ref: 00402CE9
                          • sprintf.MSVCRT ref: 00402D02
                          • sprintf.MSVCRT ref: 00402D40
                            • Part of subcall function 00402BC3: memset.MSVCRT ref: 00402BE3
                            • Part of subcall function 00402BC3: RegCloseKey.ADVAPI32 ref: 00402C47
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: Closememset$sprintf$EnumOpen
                          • String ID: %s\%s$Identities$Software\Microsoft\Internet Account Manager\Accounts$Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts$Username
                          • API String ID: 1831126014-3814494228
                          • Opcode ID: 68836d752764ed395c939e698c27d7ced96b5c8b84be7de8b5e82d7aea7963ed
                          • Instruction ID: 1b5601e0499ef747dd56af052f35eddfd4da5329eef37c5f4f36e35d9cf9c12c
                          • Opcode Fuzzy Hash: 68836d752764ed395c939e698c27d7ced96b5c8b84be7de8b5e82d7aea7963ed
                          • Instruction Fuzzy Hash: 0831507290011CBAEF11EA91CC46FEF777CAF04305F0404BABA04B2192E7B59F948B64
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • sprintf.MSVCRT ref: 004092EC
                          • LoadMenuA.USER32(?,?), ref: 004092FA
                            • Part of subcall function 00409123: GetMenuItemCount.USER32(?), ref: 00409138
                            • Part of subcall function 00409123: memset.MSVCRT ref: 00409159
                            • Part of subcall function 00409123: GetMenuItemInfoA.USER32 ref: 00409194
                            • Part of subcall function 00409123: strchr.MSVCRT ref: 004091AB
                          • DestroyMenu.USER32(00000000), ref: 00409318
                          • sprintf.MSVCRT ref: 0040935C
                          • CreateDialogParamA.USER32(?,00000000,00000000,004092C6,00000000), ref: 00409371
                          • memset.MSVCRT ref: 0040938D
                          • GetWindowTextA.USER32(00000000,?,00001000), ref: 0040939E
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: Menu$Itemmemsetsprintf$CountCreateDestroyDialogInfoLoadParamTextWindowstrchr
                          • String ID: caption$dialog_%d$menu_%d
                          • API String ID: 3071497004-3822380221
                          • Opcode ID: 00d5c196fd175f8f7b493892d5fd0a4de6fbafe6eb8e7d8c787b31c60a4e7b89
                          • Instruction ID: 4880027b7f24484a0daf4b70c4ca19663393d93293db39a52c89ae2e2b3c84be
                          • Opcode Fuzzy Hash: 00d5c196fd175f8f7b493892d5fd0a4de6fbafe6eb8e7d8c787b31c60a4e7b89
                          • Instruction Fuzzy Hash: 0121E472500248BBEB21AF509C45EEF3768FB4A715F14007BFE01A11D2D6B85D548F59
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • strchr.MSVCRT ref: 0040FA5C
                          • _mbscpy.MSVCRT ref: 0040FA6A
                            • Part of subcall function 004075CB: strlen.MSVCRT ref: 004075DD
                            • Part of subcall function 004075CB: strlen.MSVCRT ref: 004075E5
                            • Part of subcall function 004075CB: _memicmp.MSVCRT ref: 00407603
                          • _mbscpy.MSVCRT ref: 0040FABA
                          • _mbscat.MSVCRT ref: 0040FAC5
                          • memset.MSVCRT ref: 0040FAA1
                            • Part of subcall function 00406EF9: GetWindowsDirectoryA.KERNEL32(004517B0,00000104,?,0040FAFA,00000000,?,00000000,00000104,00000104), ref: 00406F0E
                            • Part of subcall function 00406EF9: _mbscpy.MSVCRT ref: 00406F1E
                          • memset.MSVCRT ref: 0040FAE9
                          • memcpy.MSVCRT ref: 0040FB04
                          • _mbscat.MSVCRT ref: 0040FB0F
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: _mbscpy$_mbscatmemsetstrlen$DirectoryWindows_memicmpmemcpystrchr
                          • String ID: \systemroot
                          • API String ID: 912701516-1821301763
                          • Opcode ID: 9693690fb4489c5de0eab49cfe3cb56840eb7b64a83fc31564cd0bab15c85152
                          • Instruction ID: 2dd3a797b17f22995e4c1cf65abf5f7fbb47152c003677c6e5f404f17f2ef451
                          • Opcode Fuzzy Hash: 9693690fb4489c5de0eab49cfe3cb56840eb7b64a83fc31564cd0bab15c85152
                          • Instruction Fuzzy Hash: 92210A7550C20469F734E2618C82FEB76EC9B55708F10007FF289E14C1EEBCA9884A6A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetClientRect.USER32(?,?), ref: 00405E58
                          • GetWindow.USER32(?,00000005), ref: 00405E70
                          • GetWindow.USER32(00000000), ref: 00405E73
                            • Part of subcall function 004015AF: GetWindowRect.USER32(?,?), ref: 004015BE
                            • Part of subcall function 004015AF: MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004015D9
                          • GetWindow.USER32(00000000,00000002), ref: 00405E7F
                          • GetDlgItem.USER32(?,000003ED), ref: 00405E96
                          • GetDlgItem.USER32(?,00000000), ref: 00405EA8
                          • GetDlgItem.USER32(?,00000000), ref: 00405EBA
                          • GetDlgItem.USER32(?,000003ED), ref: 00405EC8
                          • SetFocus.USER32(00000000), ref: 00405ECB
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: Window$Item$Rect$ClientFocusPoints
                          • String ID: u
                          • API String ID: 2432066023-4067256894
                          • Opcode ID: 859c870cb1f45ac1f52eef33470e4ab1ec2daf0450f8b20d97580b530be0d20d
                          • Instruction ID: 4031fba040b0e189dacc9fafa17b87c2e22a92f85e78ae2064a779fcc19fa509
                          • Opcode Fuzzy Hash: 859c870cb1f45ac1f52eef33470e4ab1ec2daf0450f8b20d97580b530be0d20d
                          • Instruction Fuzzy Hash: AE01E571500708AFDB112B62DC89E6BBFACEF81324F11442BF5449B252DBB8E8008E28
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          • SELECT a11,a102 FROM nssPrivate, xrefs: 0040677A
                          • C@, xrefs: 00406625
                          • key4.db, xrefs: 00406632
                          • SELECT item1,item2 FROM metadata WHERE id = 'password', xrefs: 0040668D
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memcpy$memcmpmemsetstrlen
                          • String ID: C@$SELECT a11,a102 FROM nssPrivate$SELECT item1,item2 FROM metadata WHERE id = 'password'$key4.db
                          • API String ID: 2950547843-1835927508
                          • Opcode ID: 29e67128f806e27f32a5a844b83660c965dc1796d59f1ea4f69cdb33fe82b5c1
                          • Instruction ID: 4af0f314ee18ccde9e1bafe1ac3c0a9422d02a762a4adf5b984e4b61dd213191
                          • Opcode Fuzzy Hash: 29e67128f806e27f32a5a844b83660c965dc1796d59f1ea4f69cdb33fe82b5c1
                          • Instruction Fuzzy Hash: A961CA72A00218AFDB10EF75DC81BAE73A8AF04318F12457BF915E7281D678EE548799
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00410411: RegOpenKeyExA.KERNELBASE(00401C4B,00401C4B,00000000,00020019,?,00401C4B,?,?,?), ref: 00410424
                          • memset.MSVCRT ref: 00403010
                            • Part of subcall function 004104D7: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 004104FA
                          • memset.MSVCRT ref: 0040305D
                          • sprintf.MSVCRT ref: 00403075
                          • memset.MSVCRT ref: 004030A6
                          • RegCloseKey.ADVAPI32(?), ref: 004030EE
                          • RegCloseKey.ADVAPI32(?), ref: 00403117
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset$Close$EnumOpensprintf
                          • String ID: %s\Accounts$Identity$Software\IncrediMail\Identities
                          • API String ID: 3672803090-3168940695
                          • Opcode ID: 7c98ea0b3754888334cffa6cf5d7d188fa79ef3fb5e75e3e96ead78b92b55a2f
                          • Instruction ID: 39077b7eb5a2e68ecd5ff501a3ad8ea0a91829c9588d8d8ee698511e4ba158b1
                          • Opcode Fuzzy Hash: 7c98ea0b3754888334cffa6cf5d7d188fa79ef3fb5e75e3e96ead78b92b55a2f
                          • Instruction Fuzzy Hash: EE3130B580021CFBDB11EB91CC82EEEBB7CAF15305F0041B6BA08A1152E7799F949F95
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??2@$??3@$FocusInvalidateRectmemset
                          • String ID: u
                          • API String ID: 2313361498-4067256894
                          • Opcode ID: 6f0e433ce69856a90d638de5f69032b71c8054c54d3c4ca0034aaabced9ba3f5
                          • Instruction ID: 8a5161a197c3c11310b51994d494e99affbcf27179d68dd4cd1e15cf4b4d4d3b
                          • Opcode Fuzzy Hash: 6f0e433ce69856a90d638de5f69032b71c8054c54d3c4ca0034aaabced9ba3f5
                          • Instruction Fuzzy Hash: 0431B471500605AFEB249F69C845D2AF7A8FF043547148A3FF219E72A1DB78EC508B54
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: Menu$Itemmemset$CountInfoModify_mbscatstrchr
                          • String ID: 0$6
                          • API String ID: 3540791495-3849865405
                          • Opcode ID: 74127b3a6ace4faeac3cb74118fb5aab17d7e36bf865af1988a44d13d40aa2ee
                          • Instruction ID: 3c8b7fd7a28504c7ca875bf426ab9eeebffe21bfd5384a9a2131e9ee4f2c6c2c
                          • Opcode Fuzzy Hash: 74127b3a6ace4faeac3cb74118fb5aab17d7e36bf865af1988a44d13d40aa2ee
                          • Instruction Fuzzy Hash: CB31AD72408384AFD7209F91D940A9BBBE9EF84354F04493FFAC4A2291D778D9548F6A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • LoadLibraryA.KERNEL32(comctl32.dll), ref: 00404AB3
                          • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404AC5
                          • FreeLibrary.KERNEL32(00000000), ref: 00404AD9
                          • 7078DB20.COMCTL32 ref: 00404AE7
                          • MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B04
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: Library$7078AddressFreeLoadMessageProc
                          • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                          • API String ID: 2661263322-317687271
                          • Opcode ID: 0605f619fc244978403acb2e7e50909fcfc2fbf3368997ac03ccd37e60a8c8f1
                          • Instruction ID: 36f372293bcd99ea712e996d8bb82ea6b99e6deebf99936071b003413e9982ca
                          • Opcode Fuzzy Hash: 0605f619fc244978403acb2e7e50909fcfc2fbf3368997ac03ccd37e60a8c8f1
                          • Instruction Fuzzy Hash: 860149797516103BEB115BB19C49F7FBAACDB8674AF010035F602F2182DEBCC9018A5D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memcpy$strlen
                          • String ID: -journal$-wal$immutable$nolock
                          • API String ID: 2619041689-3408036318
                          • Opcode ID: b4afe22544acede0a86ca576d850925b04083d6883ca1ee22da99f70356edf55
                          • Instruction ID: 01a3cfc3161f2179d827f175e8c33b529befff994fa447307002f7c0b3a07cf5
                          • Opcode Fuzzy Hash: b4afe22544acede0a86ca576d850925b04083d6883ca1ee22da99f70356edf55
                          • Instruction Fuzzy Hash: C7C1F372A04606AFDB14DFA9C841BDEFFB0BF44314F14825EE428E7281D778A994CB95
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??3@$strlen
                          • String ID:
                          • API String ID: 4288758904-3916222277
                          • Opcode ID: 84b328311e417d15e7997145b2c24fd86ffd8b147b4043e2eff3435c1be22cd3
                          • Instruction ID: 24b34d1c19d378cbc4a311a34392409bda21909db6314ed607bd163125115c99
                          • Opcode Fuzzy Hash: 84b328311e417d15e7997145b2c24fd86ffd8b147b4043e2eff3435c1be22cd3
                          • Instruction Fuzzy Hash: 6A61873440D782DFDB609F25948006BBBF0FB89315F54593FF5D2A22A1D739984ACB0A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 004045D6: LoadLibraryA.KERNEL32(advapi32.dll,?,0040F07D,?,00000000), ref: 004045E3
                            • Part of subcall function 004045D6: GetProcAddress.KERNEL32(00000000,CredReadA), ref: 004045FC
                            • Part of subcall function 004045D6: GetProcAddress.KERNEL32(?,CredFree), ref: 00404608
                            • Part of subcall function 004045D6: GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404614
                            • Part of subcall function 004045D6: GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404620
                            • Part of subcall function 004045D6: GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 0040462C
                          • wcslen.MSVCRT ref: 004084C2
                          • _wcsncoll.MSVCRT ref: 00408506
                          • memset.MSVCRT ref: 0040859A
                          • memcpy.MSVCRT ref: 004085BE
                          • wcschr.MSVCRT ref: 00408612
                          • LocalFree.KERNEL32(?,?,?,?,?,?,?), ref: 0040863C
                            • Part of subcall function 00404780: FreeLibrary.KERNELBASE(?,?,0040F171,?,00000000), ref: 00404795
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: AddressProc$FreeLibrary$LoadLocal_wcsncollmemcpymemsetwcschrwcslen
                          • String ID: J$Microsoft_WinInet
                          • API String ID: 1371990430-260894208
                          • Opcode ID: 16b20249654c67f53eccac8b236a4263c6876ac6a245db74242d08f005f31d3d
                          • Instruction ID: daadb017bf7cdd7d7f2103bea61dec75ef30dccaf082131e005dcc9144427660
                          • Opcode Fuzzy Hash: 16b20249654c67f53eccac8b236a4263c6876ac6a245db74242d08f005f31d3d
                          • Instruction Fuzzy Hash: D55115B1508346AFD720DF65C980A5BB7E8FF89304F00492EF998D3251EB39E918CB56
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetDlgItem.USER32(?,000003E9), ref: 00405813
                          • SendMessageA.USER32(00000000,00001009,00000000,00000000), ref: 0040582C
                          • SendMessageA.USER32(?,00001036,00000000,00000026), ref: 00405839
                          • SendMessageA.USER32(?,0000101C,00000000,00000000), ref: 00405845
                          • memset.MSVCRT ref: 004058AF
                          • SendMessageA.USER32(?,00001019,?,?), ref: 004058E0
                          • SetFocus.USER32(?), ref: 00405965
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: MessageSend$FocusItemmemset
                          • String ID: u
                          • API String ID: 4281309102-4067256894
                          • Opcode ID: 876f99dafb0e6a95d69d5b7461b0350726d0b63ba9d27f7b5ed0e67933d6ba92
                          • Instruction ID: b1c021a56b4f7756f2b42baa300122e183270d3e6e7f1cb1ff0d1441efe58172
                          • Opcode Fuzzy Hash: 876f99dafb0e6a95d69d5b7461b0350726d0b63ba9d27f7b5ed0e67933d6ba92
                          • Instruction Fuzzy Hash: 98411BB5D00109AFEB209F95DC81DAEBBB9FF04354F00406AE914B72A1D7759E50CFA4
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • UuidFromStringA.RPCRT4(220D5CD0-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410277
                          • UuidFromStringA.RPCRT4(220D5CC1-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 0041028B
                          • UuidFromStringA.RPCRT4(417E2D75-84BD-11D0-84BB-00C04FD43F8F,?), ref: 00410298
                          • memcpy.MSVCRT ref: 004102D6
                          Strings
                          • 417E2D75-84BD-11D0-84BB-00C04FD43F8F, xrefs: 00410293
                          • 220D5CD1-853A-11D0-84BC-00C04FD43F8F, xrefs: 0041027F
                          • 220D5CD0-853A-11D0-84BC-00C04FD43F8F, xrefs: 00410272
                          • 220D5CC1-853A-11D0-84BC-00C04FD43F8F, xrefs: 00410286
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: FromStringUuid$memcpy
                          • String ID: 220D5CC1-853A-11D0-84BC-00C04FD43F8F$220D5CD0-853A-11D0-84BC-00C04FD43F8F$220D5CD1-853A-11D0-84BC-00C04FD43F8F$417E2D75-84BD-11D0-84BB-00C04FD43F8F
                          • API String ID: 2859077140-2022683286
                          • Opcode ID: 8ab31fcad472c8e0f7fc1e7956a4c0916ede4aff3821f8ba5262597d6c198381
                          • Instruction ID: e4eb6b96217285778323d40e2be480743d786dbe6d4556737564963462aa5f63
                          • Opcode Fuzzy Hash: 8ab31fcad472c8e0f7fc1e7956a4c0916ede4aff3821f8ba5262597d6c198381
                          • Instruction Fuzzy Hash: CC116D7290012EABDF11DEA4DC85EEB37ACEB49354F050423FD41E7201E6B8DD848BA6
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • LoadLibraryExA.KERNEL32(netmsg.dll,00000000,00000002), ref: 00406A3F
                          • FormatMessageA.KERNEL32(00001100,00000000,?,00000400,?,00000000,00000000), ref: 00406A5D
                          • strlen.MSVCRT ref: 00406A6A
                          • _mbscpy.MSVCRT ref: 00406A7A
                          • LocalFree.KERNEL32(?,?,00000400,?,00000000,00000000), ref: 00406A84
                          • _mbscpy.MSVCRT ref: 00406A94
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: _mbscpy$FormatFreeLibraryLoadLocalMessagestrlen
                          • String ID: Unknown Error$netmsg.dll
                          • API String ID: 2881943006-572158859
                          • Opcode ID: a50973e00e0714efe879abe5d0fa4de51feb90d783acbf5609d176ef6c22eee5
                          • Instruction ID: d85fce99d4424776e4d89386e5c8d6134dfcbe96067fcf7c7fc9c3f577b26335
                          • Opcode Fuzzy Hash: a50973e00e0714efe879abe5d0fa4de51feb90d783acbf5609d176ef6c22eee5
                          • Instruction Fuzzy Hash: 0801F7316001147FEB147B51EC46F9F7E28EB06791F21407AFA06F0091DA795E209AAC
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00406D1F: GetFileAttributesA.KERNELBASE(?,00401EDD,?), ref: 00406D23
                          • _mbscpy.MSVCRT ref: 004093F7
                          • _mbscpy.MSVCRT ref: 00409407
                          • GetPrivateProfileIntA.KERNEL32(00451308,rtl,00000000,00451200), ref: 00409418
                            • Part of subcall function 00408FE9: GetPrivateProfileStringA.KERNEL32(00451308,?,0044551F,00451358,?,00451200), ref: 00409004
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: PrivateProfile_mbscpy$AttributesFileString
                          • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                          • API String ID: 888011440-2039793938
                          • Opcode ID: e990c3cc62237e0bab40cac14584cc26f7b64a30e3fa44b4e874bacec4a6fec9
                          • Instruction ID: 0b3e14b162d046b550c41b249f06feb679facb3af2f7b05e7ff0b413a15a09bb
                          • Opcode Fuzzy Hash: e990c3cc62237e0bab40cac14584cc26f7b64a30e3fa44b4e874bacec4a6fec9
                          • Instruction Fuzzy Hash: C6F09621F8435136FB203B325C03F2E29488BD2F56F1640BFBD08B65D3DAAD8811559E
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          • out of memory, xrefs: 0042E235
                          • cannot ATTACH database within transaction, xrefs: 0042DFAC
                          • unable to open database: %s, xrefs: 0042E21C
                          • too many attached databases - max %d, xrefs: 0042DF97
                          • database is already attached, xrefs: 0042E0DD
                          • database %s is already in use, xrefs: 0042E014
                          • attached databases must use the same text encoding as main database, xrefs: 0042E12C
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memcpymemset
                          • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                          • API String ID: 1297977491-2001300268
                          • Opcode ID: 6ddab01290ce87d8ebd2da98a857a844c731627c1ed98d62f1e76250c556fc69
                          • Instruction ID: c7e7a29d1825d2e945301ab40bb758a3ed070f64a4837571caa387bbb47581b8
                          • Opcode Fuzzy Hash: 6ddab01290ce87d8ebd2da98a857a844c731627c1ed98d62f1e76250c556fc69
                          • Instruction Fuzzy Hash: BFA1BC70608311DFD720DF2AE441A6BBBE4BF88318F54492FF48987252D778E945CB9A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 0040979F: ??3@YAXPAX@Z.MSVCRT ref: 004097AB
                            • Part of subcall function 0040979F: ??3@YAXPAX@Z.MSVCRT ref: 004097B9
                            • Part of subcall function 0040979F: ??3@YAXPAX@Z.MSVCRT ref: 004097CA
                            • Part of subcall function 0040979F: ??3@YAXPAX@Z.MSVCRT ref: 004097E1
                            • Part of subcall function 0040979F: ??3@YAXPAX@Z.MSVCRT ref: 004097EA
                          • ??2@YAPAXI@Z.MSVCRT ref: 004099C0
                          • ??2@YAPAXI@Z.MSVCRT ref: 004099DC
                          • memcpy.MSVCRT ref: 00409A04
                          • memcpy.MSVCRT ref: 00409A21
                          • ??2@YAPAXI@Z.MSVCRT ref: 00409AAA
                          • ??2@YAPAXI@Z.MSVCRT ref: 00409AB4
                          • ??2@YAPAXI@Z.MSVCRT ref: 00409AEC
                            • Part of subcall function 00408B27: LoadStringA.USER32(00000000,00000006,?,?), ref: 00408BF0
                            • Part of subcall function 00408B27: memcpy.MSVCRT ref: 00408C2F
                            • Part of subcall function 00408B27: _mbscpy.MSVCRT ref: 00408BA2
                            • Part of subcall function 00408B27: strlen.MSVCRT ref: 00408BC0
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??2@??3@$memcpy$LoadString_mbscpystrlen
                          • String ID: $$d
                          • API String ID: 2915808112-2066904009
                          • Opcode ID: aaabb9704ee97ed3d88bb120afced9611e84c7ee3aa1941d020b92fe57cbaf77
                          • Instruction ID: c499689f9fa1b304e99f77f7c015d52b7a22264b22564a6ed79451bf6b5d1632
                          • Opcode Fuzzy Hash: aaabb9704ee97ed3d88bb120afced9611e84c7ee3aa1941d020b92fe57cbaf77
                          • Instruction Fuzzy Hash: A6513B71601704AFD724DF69C582B9AB7F4BF48354F10892EE65ADB282EB74A940CF44
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 0040312A: GetPrivateProfileStringA.KERNEL32(00000000,?,0044551F,?,?,?), ref: 0040314E
                          • strchr.MSVCRT ref: 0040326D
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: PrivateProfileStringstrchr
                          • String ID: 1$LoginName$PopAccount$PopServer$RealName$ReturnAddress$SavePasswordText$UsesIMAP
                          • API String ID: 1348940319-1729847305
                          • Opcode ID: 744f29d2d2deae3fb126fd39ba5d775996f393179d4ac578be52819d2814d06a
                          • Instruction ID: ebc3817507c74d0428b70d6b21ed795ce2a60aa758e9561c8f94ff6eeee5590f
                          • Opcode Fuzzy Hash: 744f29d2d2deae3fb126fd39ba5d775996f393179d4ac578be52819d2814d06a
                          • Instruction Fuzzy Hash: 4A318F7090420ABEEF219F60CC45BD9BFACEF14319F10816AF9587A1D2D7B89B948B54
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memcpy
                          • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                          • API String ID: 3510742995-3273207271
                          • Opcode ID: 5f1fb5d69f7b5319dba649b4cfeeb14085fd9f05635fb8ab0532745b2c558304
                          • Instruction ID: 3875996c88d7773ad821c0e973cab4ee718d2e20412430da402bf8ed1fec6725
                          • Opcode Fuzzy Hash: 5f1fb5d69f7b5319dba649b4cfeeb14085fd9f05635fb8ab0532745b2c558304
                          • Instruction Fuzzy Hash: DF01D4F7EE469869FB3100094C23FEB4A8947A7720F360027F98525283A0CD0CD3429F
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00406E4C: GetVersionExA.KERNEL32(00451168,0000001A,00410749,00000104), ref: 00406E66
                          • memset.MSVCRT ref: 0040F396
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000000FF,00000000,00000000,?,?,?), ref: 0040F3AD
                          • _strnicmp.MSVCRT ref: 0040F3C7
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000000FF,00000000,00000000,?,?,?,?,?,?), ref: 0040F3F3
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,000000FF,00000000,00000000,?,?,?,?,?,?), ref: 0040F413
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: ByteCharMultiWide$Version_strnicmpmemset
                          • String ID: WindowsLive:name=*$windowslive:name=
                          • API String ID: 945165440-3589380929
                          • Opcode ID: d3537b1fcb66bcdc9fcff810ba9b7ca2134040b22c3a5e9a54c7dacba821f27a
                          • Instruction ID: 060cf85e61608373f285e6b38907096c177b9006a2a87b36be12541c3eea0e32
                          • Opcode Fuzzy Hash: d3537b1fcb66bcdc9fcff810ba9b7ca2134040b22c3a5e9a54c7dacba821f27a
                          • Instruction Fuzzy Hash: 034157B1408345AFD720DF24D88496BBBE8FB95314F004A3EF995A3691D734ED48CB66
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 004101D8: UuidFromStringA.RPCRT4(5e7e8100-9138-11d1-945a-00c04fc308ff,?), ref: 004101EF
                            • Part of subcall function 004101D8: UuidFromStringA.RPCRT4(00000000-0000-0000-0000-000000000000,?), ref: 004101FC
                            • Part of subcall function 004101D8: memcpy.MSVCRT ref: 00410238
                          • strchr.MSVCRT ref: 00403711
                          • _mbscpy.MSVCRT ref: 0040373A
                          • _mbscpy.MSVCRT ref: 0040374A
                          • strlen.MSVCRT ref: 0040376A
                          • sprintf.MSVCRT ref: 0040378E
                          • _mbscpy.MSVCRT ref: 004037A4
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: _mbscpy$FromStringUuid$memcpysprintfstrchrstrlen
                          • String ID: %s@gmail.com
                          • API String ID: 500647785-4097000612
                          • Opcode ID: 09406eb24e79600c9d4883016bab03a37dcb4fc957deefa4a0a4f4140eb3a03a
                          • Instruction ID: 72ede288a24c3b6660e37d3abac1967f853eec84a0165e1bcd054a17ec7f23cd
                          • Opcode Fuzzy Hash: 09406eb24e79600c9d4883016bab03a37dcb4fc957deefa4a0a4f4140eb3a03a
                          • Instruction Fuzzy Hash: 6F21ABF290411C6AEB11DB54DCC5FDAB7BCAB54308F0445AFF609E2181DA789B888B65
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memset.MSVCRT ref: 00409239
                          • GetDlgCtrlID.USER32(?), ref: 00409244
                          • GetWindowTextA.USER32(?,?,00001000), ref: 00409257
                          • memset.MSVCRT ref: 0040927D
                          • GetClassNameA.USER32(?,?,000000FF), ref: 00409290
                          • _strcmpi.MSVCRT ref: 004092A2
                            • Part of subcall function 004090EB: _itoa.MSVCRT ref: 0040910C
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset$ClassCtrlNameTextWindow_itoa_strcmpi
                          • String ID: sysdatetimepick32
                          • API String ID: 3411445237-4169760276
                          • Opcode ID: 0148a07d43ffd720cfa84905c97652f9f91ed7e1207943edf04fbd1bb2dbc290
                          • Instruction ID: a0e2247af9db09d92512eaab276e72a1f93a19cb85935bad7b90667d70954a25
                          • Opcode Fuzzy Hash: 0148a07d43ffd720cfa84905c97652f9f91ed7e1207943edf04fbd1bb2dbc290
                          • Instruction Fuzzy Hash: 32110A728050187FEB119754DC41EEB77ACEF55301F0000FBFA04E2142EAB48E848B64
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetTempPathA.KERNEL32(00000104,?), ref: 0040BEB8
                          • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 0040BECA
                          • GetTempFileNameA.KERNEL32(?,00446634,00000000,?), ref: 0040BEEC
                          • OpenClipboard.USER32(?), ref: 0040BF0C
                          • GetLastError.KERNEL32 ref: 0040BF25
                          • DeleteFileA.KERNEL32(00000000), ref: 0040BF42
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: FileTemp$ClipboardDeleteDirectoryErrorLastNameOpenPathWindows
                          • String ID: t
                          • API String ID: 2014771361-2238339752
                          • Opcode ID: f1e64fb6be10128bbee6f3e595a742589036f7cac5447e39c680a47d04657e65
                          • Instruction ID: 907fbb9bc954c15d9eb0ad6f98a85717611d4d669dd49ad048df0fde8b6b2f4b
                          • Opcode Fuzzy Hash: f1e64fb6be10128bbee6f3e595a742589036f7cac5447e39c680a47d04657e65
                          • Instruction Fuzzy Hash: 5B11A1B6900218ABDF20AB61DC49FDB77BCAB11701F0000B6B685E2092DBB499C48F68
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetDlgItem.USER32(?,000003E9), ref: 00405A1A
                          • GetDlgItem.USER32(?,000003E9), ref: 00405A2D
                          • GetDlgItem.USER32(?,000003E9), ref: 00405A42
                          • GetDlgItem.USER32(?,000003E9), ref: 00405A5A
                          • EndDialog.USER32(?,00000002), ref: 00405A76
                          • EndDialog.USER32(?,00000001), ref: 00405A89
                            • Part of subcall function 00405723: GetDlgItem.USER32(?,000003E9), ref: 00405731
                            • Part of subcall function 00405723: GetDlgItemInt.USER32(?,000003ED,00000000,00000000), ref: 00405746
                            • Part of subcall function 00405723: SendMessageA.USER32(?,00001032,00000000,00000000), ref: 00405762
                          • SendDlgItemMessageA.USER32(?,000003ED,000000C5,00000003,00000000), ref: 00405AA1
                          • SetDlgItemInt.USER32(?,000003ED,?,00000000), ref: 00405BAD
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: Item$DialogMessageSend
                          • String ID:
                          • API String ID: 2485852401-0
                          • Opcode ID: 6705b758d8a8385fcf126e2abef302c8a68af69db22d8c06dbb4b6141a6eddaf
                          • Instruction ID: 8242765b3035aad42ded22ad072fa167e05c4db834e8c53cb5a522b966aec9bd
                          • Opcode Fuzzy Hash: 6705b758d8a8385fcf126e2abef302c8a68af69db22d8c06dbb4b6141a6eddaf
                          • Instruction Fuzzy Hash: DC619E70200A05AFDB21AF25C8C6A2BB7A5FF44724F00C23AF955A76D1E778A950CF95
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • SendMessageA.USER32(?,00001003,00000001,?), ref: 0040B138
                          • SendMessageA.USER32(?,00001003,00000000,?), ref: 0040B16D
                          • LoadImageA.USER32(00000085,00000000,00000010,00000010,00001000), ref: 0040B1A2
                          • LoadImageA.USER32(00000086,00000000,00000010,00000010,00001000), ref: 0040B1BE
                          • GetSysColor.USER32(0000000F), ref: 0040B1CE
                          • DeleteObject.GDI32(?), ref: 0040B202
                          • DeleteObject.GDI32(00000000), ref: 0040B205
                          • SendMessageA.USER32(00000000,00001208,00000000,?), ref: 0040B223
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: MessageSend$DeleteImageLoadObject$Color
                          • String ID:
                          • API String ID: 3642520215-0
                          • Opcode ID: 3b8b596084a258e6a3d6c587c6e164043eee07433b393cce24ea64cb7095e9ca
                          • Instruction ID: 035281c2cfb68a6c78eb86e81ad7e7fbca9e62364f8fd823d381b3cb5a7ebbdd
                          • Opcode Fuzzy Hash: 3b8b596084a258e6a3d6c587c6e164043eee07433b393cce24ea64cb7095e9ca
                          • Instruction Fuzzy Hash: B7318175280708BFFA316B709C47FD6B795EB48B01F104829F3856A1E2CAF278909B58
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: strlen$_mbscat_mbscpymemset
                          • String ID: C@$key3.db$key4.db
                          • API String ID: 581844971-2841947474
                          • Opcode ID: e5494ad0edafd44481aca6acbbe86219ad8b07e707f9afed040af0c0a0aebaa6
                          • Instruction ID: 276f595f6d9fb14d306b90d89522efda4e53a8973e3769554d2ee0aec37c6aae
                          • Opcode Fuzzy Hash: e5494ad0edafd44481aca6acbbe86219ad8b07e707f9afed040af0c0a0aebaa6
                          • Instruction Fuzzy Hash: 5D21F9729041196ADF10AA66DC41FCE77ACDF11319F1100BBF40DF6091EE38DA958668
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetClientRect.USER32(?,?), ref: 0040B88E
                          • GetWindowRect.USER32(?,?), ref: 0040B8A4
                          • GetWindowRect.USER32(?,?), ref: 0040B8B7
                          • BeginDeferWindowPos.USER32(00000003), ref: 0040B8D4
                          • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 0040B8F1
                          • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 0040B911
                          • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000004), ref: 0040B938
                          • EndDeferWindowPos.USER32(?), ref: 0040B941
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: Window$Defer$Rect$BeginClient
                          • String ID:
                          • API String ID: 2126104762-0
                          • Opcode ID: f6309ff644c12743b91cf70e9e807ca9d204e09485dec5c7f95147756245f13c
                          • Instruction ID: cf9ea3ecf4623016fd9dc3f5f3f1318dd3ce101ba80f5eccba740e206150479f
                          • Opcode Fuzzy Hash: f6309ff644c12743b91cf70e9e807ca9d204e09485dec5c7f95147756245f13c
                          • Instruction Fuzzy Hash: F221C276A00609FFDF118FA8DD89FEEBBB9FB08700F104065FA55A2160C7716A519F24
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • EmptyClipboard.USER32 ref: 00406C45
                          • strlen.MSVCRT ref: 00406C52
                          • GlobalAlloc.KERNEL32(00002000,00000001,?,?,?,?,0040C0BB,?), ref: 00406C61
                          • GlobalFix.KERNEL32(00000000), ref: 00406C6E
                          • memcpy.MSVCRT ref: 00406C77
                          • GlobalUnWire.KERNEL32(00000000), ref: 00406C80
                          • SetClipboardData.USER32(00000001,00000000), ref: 00406C89
                          • CloseClipboard.USER32 ref: 00406C99
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: ClipboardGlobal$AllocCloseDataEmptyWirememcpystrlen
                          • String ID:
                          • API String ID: 2315226746-0
                          • Opcode ID: ee3e5d8b8b8103545cd3f6b58303d98c31de17f75192de6e2f85eb2c234adac6
                          • Instruction ID: 8edcd2d2b4f986e571765b3eebb92d88a59871b3330cf63fe52768e208e874e1
                          • Opcode Fuzzy Hash: ee3e5d8b8b8103545cd3f6b58303d98c31de17f75192de6e2f85eb2c234adac6
                          • Instruction Fuzzy Hash: 23F0E93B5047186BD7102FA1BC4CE6BBB2CDB86F96B050039FA0AD6253DE755C0447B9
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memcpymemset
                          • String ID: abort due to ROLLBACK$out of memory$statement aborts at %d: [%s] %s$string or blob too big$unknown error
                          • API String ID: 1297977491-3883738016
                          • Opcode ID: ec180b53c73d386f260fbd60f4e29b72e3bb9c2a6b5e225ae3417af3491c72e6
                          • Instruction ID: fc76bc8343265493366407fdb1c4d707e5d8df4650a3499163c8513785776b89
                          • Opcode Fuzzy Hash: ec180b53c73d386f260fbd60f4e29b72e3bb9c2a6b5e225ae3417af3491c72e6
                          • Instruction Fuzzy Hash: 64128B71A04629DFDB14CF69E481AADBBB1FF08314F54419AE805AB341D738B982CF99
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: __aulldvrm$__aullrem
                          • String ID: -$-x0$0123456789ABCDEF0123456789abcdef
                          • API String ID: 643879872-978417875
                          • Opcode ID: 73e90253892cd7d40fca50a1c2c0480d43455e5e9d4f7039f07d8d475e9bdb23
                          • Instruction ID: 6ef1093ec9221891fb8685c47ab9d8627f9f8a7ffe3427591e5c2e9f96174410
                          • Opcode Fuzzy Hash: 73e90253892cd7d40fca50a1c2c0480d43455e5e9d4f7039f07d8d475e9bdb23
                          • Instruction Fuzzy Hash: A5617C316083819FD7118F2885407ABBBE1AFC6704F18495FFAC497362D379D9898B8A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memcpymemset$strlen$_memicmp
                          • String ID: user_pref("
                          • API String ID: 765841271-2487180061
                          • Opcode ID: 7a1adde69f0e08c2e228f59276f9fb0b6105cf7cc96dfcb17d977d75f3f89509
                          • Instruction ID: 5a65487526c3994ab00424e18f338503154a615df115d4cfef8f26f9df640fc7
                          • Opcode Fuzzy Hash: 7a1adde69f0e08c2e228f59276f9fb0b6105cf7cc96dfcb17d977d75f3f89509
                          • Instruction Fuzzy Hash: 7F419AB6904118AEDB10DB95DC81FDA77AC9F44314F1042FBE605F7181EA38AF498FA9
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00406AD1: strlen.MSVCRT ref: 00406ADE
                            • Part of subcall function 00406AD1: WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,0040A8D9,?,<item>), ref: 00406AEB
                          • _mbscat.MSVCRT ref: 0040A65B
                          • sprintf.MSVCRT ref: 0040A67D
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: FileWrite_mbscatsprintfstrlen
                          • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                          • API String ID: 1631269929-4153097237
                          • Opcode ID: 0a1c5f3df8c0410e4819bffe23f535fd28423f127cd07168cb4d0992b4b9d367
                          • Instruction ID: 832b2c653fc05485a7f242a7eb3c8d8175a8ee497f4c95e58b3f18e695e9ea43
                          • Opcode Fuzzy Hash: 0a1c5f3df8c0410e4819bffe23f535fd28423f127cd07168cb4d0992b4b9d367
                          • Instruction Fuzzy Hash: AE31AE31900218AFDF15DF94C8869DE7BB5FF45320F10416AFD11BB292DB76AA51CB84
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • _mbscpy.MSVCRT ref: 00408BA2
                            • Part of subcall function 00408FB1: _itoa.MSVCRT ref: 00408FD2
                          • strlen.MSVCRT ref: 00408BC0
                          • LoadStringA.USER32(00000000,00000006,?,?), ref: 00408BF0
                          • memcpy.MSVCRT ref: 00408C2F
                            • Part of subcall function 00408AA5: ??2@YAPAXI@Z.MSVCRT ref: 00408ACD
                            • Part of subcall function 00408AA5: ??2@YAPAXI@Z.MSVCRT ref: 00408AEB
                            • Part of subcall function 00408AA5: ??2@YAPAXI@Z.MSVCRT ref: 00408B09
                            • Part of subcall function 00408AA5: ??2@YAPAXI@Z.MSVCRT ref: 00408B19
                          Strings
                          • strings, xrefs: 00408B98
                          • <html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>, xrefs: 00408B3B
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??2@$LoadString_itoa_mbscpymemcpystrlen
                          • String ID: <html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>$strings
                          • API String ID: 4036804644-4125592482
                          • Opcode ID: 2ef5bdd7b6553c1411f0866e16a237609f5efe4191e7d453619a5ad3a1a82c98
                          • Instruction ID: 2fb35d0cb8d6515d264437a76ba5de351b7eb647a908b3ccb3b2e5853623431c
                          • Opcode Fuzzy Hash: 2ef5bdd7b6553c1411f0866e16a237609f5efe4191e7d453619a5ad3a1a82c98
                          • Instruction Fuzzy Hash: 9F3136B95003019FEB149B18EE40E323776EB59346B14443EF845A72B3DB39E815CB5C
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memset.MSVCRT ref: 00407E84
                            • Part of subcall function 00410475: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,0040264A,?), ref: 0041048B
                            • Part of subcall function 00404666: _mbscpy.MSVCRT ref: 004046B5
                            • Part of subcall function 0040472F: LoadLibraryA.KERNELBASE(?,0040F08A,?,00000000), ref: 00404737
                            • Part of subcall function 0040472F: GetProcAddress.KERNEL32(00000000,?), ref: 0040474F
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00408018,?,000000FD,00000000,00000000,?,00000000,00408018,?,?,?,?,00000000), ref: 00407F1F
                          • LocalFree.KERNEL32(?,?,?,?,?,00000000,75D6ED80,?), ref: 00407F2F
                            • Part of subcall function 00410452: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C69,?,?,?,?,00401C69,?,?,?), ref: 0041046D
                            • Part of subcall function 00406CA4: strlen.MSVCRT ref: 00406CA9
                            • Part of subcall function 00406CA4: memcpy.MSVCRT ref: 00406CBE
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: QueryValue$AddressByteCharFreeLibraryLoadLocalMultiProcWide_mbscpymemcpymemsetstrlen
                          • String ID: POP3_credentials$POP3_host$POP3_name
                          • API String ID: 524865279-2190619648
                          • Opcode ID: bb8a79189eebe21ea9a309b84d13f13660712c6c97ce44d04bc2eb4e66ed4208
                          • Instruction ID: 2c282e6ff88bd57be97cdb9cd65414afbc0c2375aa853475002addcb7488d922
                          • Opcode Fuzzy Hash: bb8a79189eebe21ea9a309b84d13f13660712c6c97ce44d04bc2eb4e66ed4208
                          • Instruction Fuzzy Hash: 75316075A4025DAFDB11EB69CC81AEEBBBCEF45314F0080B6FA04A3141D6789F498F65
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: ItemMenu$CountInfomemsetstrchr
                          • String ID: 0$6
                          • API String ID: 2300387033-3849865405
                          • Opcode ID: 99e79691bf6533de20a974ac65a5fcf95ef7575eddab1868be2d8be4df739519
                          • Instruction ID: 102fedc8b068d714547c44678b24ea6bae60c59159463c21af6927f9d555436f
                          • Opcode Fuzzy Hash: 99e79691bf6533de20a974ac65a5fcf95ef7575eddab1868be2d8be4df739519
                          • Instruction Fuzzy Hash: B8210F71108380AFE7108F61D889A5FB7E8FB85344F04093FF684A6282E779DD048B5A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memcpystrlen$memsetsprintf
                          • String ID: %s (%s)
                          • API String ID: 3756086014-1363028141
                          • Opcode ID: 4357e9335d32c2bf08e92843452a3ff925627b6c59b5d6ec26037838f45d6104
                          • Instruction ID: 49fd0969a141bf365c85b2e85b726abfc67c7a4f8a3ab277a670c68284d415ec
                          • Opcode Fuzzy Hash: 4357e9335d32c2bf08e92843452a3ff925627b6c59b5d6ec26037838f45d6104
                          • Instruction Fuzzy Hash: 9A1193B1800118AFEB21DF59CD45F99B7ACEF41308F008466FA48EB106D275AB15CB95
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00406A9F: CreateFileA.KERNEL32(R7D,80000000,00000001,00000000,00000003,00000000,00000000,0044368E,?,.8D,00443752,?,?,*.oeaccount,.8D,?), ref: 00406AB1
                          • GetFileSize.KERNEL32(00000000,00000000,?,00000000,.8D,00443752,?,?,*.oeaccount,.8D,?,00000104), ref: 0044369D
                          • ??2@YAPAXI@Z.MSVCRT ref: 004436AF
                          • SetFilePointer.KERNEL32(00000000,00000002,00000000,00000000,?), ref: 004436BE
                            • Part of subcall function 004072EF: ReadFile.KERNEL32(00000000,?,004436D1,00000000,00000000,?,?,004436D1,?,00000000), ref: 00407306
                            • Part of subcall function 00443546: wcslen.MSVCRT ref: 00443559
                            • Part of subcall function 00443546: ??2@YAPAXI@Z.MSVCRT ref: 00443562
                            • Part of subcall function 00443546: WideCharToMultiByte.KERNEL32(00000000,00000000,004436E8,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004436E8,?,00000000), ref: 0044357B
                            • Part of subcall function 00443546: strlen.MSVCRT ref: 004435BE
                            • Part of subcall function 00443546: memcpy.MSVCRT ref: 004435D8
                            • Part of subcall function 00443546: ??3@YAXPAX@Z.MSVCRT ref: 0044366B
                          • ??3@YAXPAX@Z.MSVCRT ref: 004436E9
                          • CloseHandle.KERNEL32(?), ref: 004436F3
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: File$??2@??3@$ByteCharCloseCreateHandleMultiPointerReadSizeWidememcpystrlenwcslen
                          • String ID: .8D
                          • API String ID: 1886237854-2881260426
                          • Opcode ID: e9accfc59e3ea295214b65d31af1a641a7a6f9c6ce4573a7963a3bdc594cfe72
                          • Instruction ID: b4a99ca98ea4b9fd05b978b53b3f03ecc28babd8507da3569ede40c7aa85cfb3
                          • Opcode Fuzzy Hash: e9accfc59e3ea295214b65d31af1a641a7a6f9c6ce4573a7963a3bdc594cfe72
                          • Instruction Fuzzy Hash: 42012432804248BFEB206F75EC4ED9FBB6CEF46364B10812BF81487261DA358D14CA28
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • SendMessageA.USER32(?,0000000B,00000000,00000000), ref: 0040B70C
                            • Part of subcall function 00406A00: LoadCursorA.USER32(00000000,00007F02), ref: 00406A07
                            • Part of subcall function 00406A00: SetCursor.USER32(00000000), ref: 00406A0E
                          • SendMessageA.USER32(?,00001009,00000000,00000000), ref: 0040B72F
                            • Part of subcall function 0040B65E: sprintf.MSVCRT ref: 0040B684
                            • Part of subcall function 0040B65E: sprintf.MSVCRT ref: 0040B6AE
                            • Part of subcall function 0040B65E: _mbscat.MSVCRT ref: 0040B6C1
                            • Part of subcall function 0040B65E: SendMessageA.USER32(?,00000401,00000000,?), ref: 0040B6E7
                          • SetCursor.USER32(?,?,0040C8F2), ref: 0040B754
                          • SetFocus.USER32(?,?,?,0040C8F2), ref: 0040B766
                          • SendMessageA.USER32(?,0000000B,00000001,00000000), ref: 0040B77D
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: MessageSend$Cursor$sprintf$FocusLoad_mbscat
                          • String ID: u
                          • API String ID: 2374668499-4067256894
                          • Opcode ID: 53ade561a914af880d1e6a05375d4a59a2fac5c4dfd76dfdfba0808ab67976fb
                          • Instruction ID: 612281c0e7bcc4a6d3b4da52a7b96f70e992a4283d6ab6b50bd9db3d0aad170a
                          • Opcode Fuzzy Hash: 53ade561a914af880d1e6a05375d4a59a2fac5c4dfd76dfdfba0808ab67976fb
                          • Instruction Fuzzy Hash: 120129B5200A00EFD726AB75CC85FA6B7E9FF48315F0604B9F1199B272CA726D018F14
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorLastMessagesprintf
                          • String ID: Error$Error %d: %s$t
                          • API String ID: 1670431679-2538549913
                          • Opcode ID: 69570e8fca1396db75b798702dd88894c728b3c47429f38a677bbfbefaa49fd2
                          • Instruction ID: c7de35334a9b91ea45d990eb2cc533a67ee34048a8af2c328f2cc0c5e5106846
                          • Opcode Fuzzy Hash: 69570e8fca1396db75b798702dd88894c728b3c47429f38a677bbfbefaa49fd2
                          • Instruction Fuzzy Hash: BBF0ECBA90010877DB11BB54DC05F9A77FCBB81304F1500B6FA45F2142EE74DA058F99
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          • abort due to ROLLBACK, xrefs: 00427E1B
                          • cannot open savepoint - SQL statements in progress, xrefs: 00426002
                          • unknown error, xrefs: 00426E65
                          • cannot release savepoint - SQL statements in progress, xrefs: 004260EE
                          • no such savepoint: %s, xrefs: 004260D0
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memcpy
                          • String ID: abort due to ROLLBACK$cannot open savepoint - SQL statements in progress$cannot release savepoint - SQL statements in progress$no such savepoint: %s$unknown error
                          • API String ID: 3510742995-3035234601
                          • Opcode ID: f891372fe87baf48bda125dec3b2232890a750ac063dfed77912f4c4cabfec4f
                          • Instruction ID: 1b592f7810eb55fdfd9c77514c161e0aeb834189807bd0e5c0ad66af0c508e0f
                          • Opcode Fuzzy Hash: f891372fe87baf48bda125dec3b2232890a750ac063dfed77912f4c4cabfec4f
                          • Instruction Fuzzy Hash: 4CC15B70A04625DFDB18CFA9E485BA9BBB1FF08304F5540AFE405A7392D738A851CF99
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset
                          • String ID: GROUP$H$ORDER$a GROUP BY clause is required before HAVING$aggregate functions are not allowed in the GROUP BY clause
                          • API String ID: 2221118986-3608744896
                          • Opcode ID: 25f6d7551ca5451081e928a756deb932952f8e5ad15a22f33089aef5e0cd9e28
                          • Instruction ID: 61df25c06be2fd61ed6862701848550dc8e0fb41ea407877f6cf168bc1a83922
                          • Opcode Fuzzy Hash: 25f6d7551ca5451081e928a756deb932952f8e5ad15a22f33089aef5e0cd9e28
                          • Instruction Fuzzy Hash: B5B16671208311DFD720CF29E580A2BB7E5FF98314F91485EF88587692E738E841CB9A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memcpy.MSVCRT ref: 00441F4B
                            • Part of subcall function 00441A6C: memcmp.MSVCRT ref: 00441AB5
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memcmpmemcpy
                          • String ID: BINARY$NOCASE$RTRIM$main$temp
                          • API String ID: 1784268899-4153596280
                          • Opcode ID: 6b6b8ae9c0e91365de8150e640e5bb5f4ec7e5282d2e56bc441d5ca3420a582e
                          • Instruction ID: db602eaa8e833254b0c0c9be43f42c24c685b457dfa8f14c56b0ec28138b2128
                          • Opcode Fuzzy Hash: 6b6b8ae9c0e91365de8150e640e5bb5f4ec7e5282d2e56bc441d5ca3420a582e
                          • Instruction Fuzzy Hash: 5091E2B1900700AFE730AF25C981A9EBBE5AB44304F14492FF14697392C7B9A985CB59
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • OpenProcess.KERNEL32(00000410,00000000,00000000,?,00000000,00000000,?,0040F7DE,00000000,00000000), ref: 0040FB5E
                          • memset.MSVCRT ref: 0040FBBB
                          • memset.MSVCRT ref: 0040FBCD
                            • Part of subcall function 0040FA44: _mbscpy.MSVCRT ref: 0040FA6A
                          • memset.MSVCRT ref: 0040FCB4
                          • _mbscpy.MSVCRT ref: 0040FCD9
                          • CloseHandle.KERNEL32(00000000,0040F7DE,?), ref: 0040FD23
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset$_mbscpy$CloseHandleOpenProcess
                          • String ID:
                          • API String ID: 3974772901-0
                          • Opcode ID: 4ad987a4bc41c02407afd48bd51c39f8f43132cb09b5aa7545cf57ad8340978a
                          • Instruction ID: 4cd0dab2c11de29b1205cc267bdcfe4bbed2ca853fb67bca61950d18440e6937
                          • Opcode Fuzzy Hash: 4ad987a4bc41c02407afd48bd51c39f8f43132cb09b5aa7545cf57ad8340978a
                          • Instruction Fuzzy Hash: 79511EB590021CABDB60DF95DD85ADEBBB8FF44305F1000BAE609A2281D7759E84CF69
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • wcslen.MSVCRT ref: 00443559
                          • ??2@YAPAXI@Z.MSVCRT ref: 00443562
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,004436E8,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004436E8,?,00000000), ref: 0044357B
                            • Part of subcall function 00442878: ??2@YAPAXI@Z.MSVCRT ref: 0044288D
                            • Part of subcall function 00442878: ??2@YAPAXI@Z.MSVCRT ref: 004428AB
                            • Part of subcall function 00442878: ??2@YAPAXI@Z.MSVCRT ref: 004428C6
                            • Part of subcall function 00442878: ??2@YAPAXI@Z.MSVCRT ref: 004428EF
                            • Part of subcall function 00442878: ??2@YAPAXI@Z.MSVCRT ref: 00442913
                          • strlen.MSVCRT ref: 004435BE
                            • Part of subcall function 004429E9: ??3@YAXPAX@Z.MSVCRT ref: 004429F4
                            • Part of subcall function 004429E9: ??2@YAPAXI@Z.MSVCRT ref: 00442A03
                          • memcpy.MSVCRT ref: 004435D8
                          • ??3@YAXPAX@Z.MSVCRT ref: 0044366B
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??2@$??3@$ByteCharMultiWidememcpystrlenwcslen
                          • String ID:
                          • API String ID: 577244452-0
                          • Opcode ID: 4370cab8d1ed043324ede4dc3b9a4d06d61cdd8212607e5f6e8765e25bb93f57
                          • Instruction ID: ed198900897cbedb477538fc3de06edee324e7a25cf08c3aedaf46951cf6a217
                          • Opcode Fuzzy Hash: 4370cab8d1ed043324ede4dc3b9a4d06d61cdd8212607e5f6e8765e25bb93f57
                          • Instruction Fuzzy Hash: 14318672804219AFEF21EF65C8819DEBBB5EF45314F5480AAF108A3200CB396F84DF49
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00406CA4: strlen.MSVCRT ref: 00406CA9
                            • Part of subcall function 00406CA4: memcpy.MSVCRT ref: 00406CBE
                          • _strcmpi.MSVCRT ref: 004044FA
                          • _strcmpi.MSVCRT ref: 00404518
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: _strcmpi$memcpystrlen
                          • String ID: imap$pop3$smtp
                          • API String ID: 2025310588-821077329
                          • Opcode ID: 4172489bfdd0b02c38134a290eb16c247b5a863f83d9230e12e3431aa9a1b902
                          • Instruction ID: ee17be80c36da3591ff53c386c7625c128025028662cc5e87d89578f4f8b6d75
                          • Opcode Fuzzy Hash: 4172489bfdd0b02c38134a290eb16c247b5a863f83d9230e12e3431aa9a1b902
                          • Instruction Fuzzy Hash: C42196B25046189BEB51DB15CD417DAB3FCEF90304F10006BE79AB7181DB787B498B59
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memset.MSVCRT ref: 0040BD88
                            • Part of subcall function 00408B27: LoadStringA.USER32(00000000,00000006,?,?), ref: 00408BF0
                            • Part of subcall function 00408B27: memcpy.MSVCRT ref: 00408C2F
                            • Part of subcall function 00408B27: _mbscpy.MSVCRT ref: 00408BA2
                            • Part of subcall function 00408B27: strlen.MSVCRT ref: 00408BC0
                            • Part of subcall function 00407446: memset.MSVCRT ref: 00407466
                            • Part of subcall function 00407446: sprintf.MSVCRT ref: 00407493
                            • Part of subcall function 00407446: strlen.MSVCRT ref: 0040749F
                            • Part of subcall function 00407446: memcpy.MSVCRT ref: 004074B4
                            • Part of subcall function 00407446: strlen.MSVCRT ref: 004074C2
                            • Part of subcall function 00407446: memcpy.MSVCRT ref: 004074D2
                            • Part of subcall function 00407279: _mbscpy.MSVCRT ref: 004072DF
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memcpystrlen$_mbscpymemset$LoadStringsprintf
                          • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                          • API String ID: 2726666094-3614832568
                          • Opcode ID: dc175560a6198b9798b44ce5f971e01ac777fcc381b56c1877e1d198c2103063
                          • Instruction ID: 9cc38d581f61d2a6594629c27ef9ad5a8c62d4d42b688fbaa09f609bba3e4d8d
                          • Opcode Fuzzy Hash: dc175560a6198b9798b44ce5f971e01ac777fcc381b56c1877e1d198c2103063
                          • Instruction Fuzzy Hash: 0121FBB1C002599ADB40EFA5D981BDDBBB4AB08308F10517EF548B6281DB382A45CB9E
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memset.MSVCRT ref: 00403A78
                          • memset.MSVCRT ref: 00403A91
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00001FFF), ref: 00403AA8
                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00001FFF,00000000,00000000), ref: 00403AC7
                          • strlen.MSVCRT ref: 00403AD9
                          • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00403AEA
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: ByteCharMultiWidememset$FileWritestrlen
                          • String ID:
                          • API String ID: 1786725549-0
                          • Opcode ID: e58b70ba74cd0776df0cd714b6ebe3d4fb4c03e2cd7b5e97725e455eaa9c95ba
                          • Instruction ID: 3c11530c7ff43e2cab0ee1a3c4b7d34204fc8064c5823527b9b114d7af9e1f20
                          • Opcode Fuzzy Hash: e58b70ba74cd0776df0cd714b6ebe3d4fb4c03e2cd7b5e97725e455eaa9c95ba
                          • Instruction Fuzzy Hash: 50112DBA80412CBFFB10AB94DC85EEBB3ADEF09355F0001A6B715D2092D6359F548B78
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memcmp.MSVCRT ref: 00406129
                            • Part of subcall function 00406057: memcmp.MSVCRT ref: 00406075
                            • Part of subcall function 00406057: memcpy.MSVCRT ref: 004060A4
                            • Part of subcall function 00406057: memcpy.MSVCRT ref: 004060B9
                          • memcmp.MSVCRT ref: 00406154
                          • memcmp.MSVCRT ref: 0040617C
                          • memcpy.MSVCRT ref: 00406199
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memcmp$memcpy
                          • String ID: global-salt$password-check
                          • API String ID: 231171946-3927197501
                          • Opcode ID: e64782263ff5605526e0fe757cea6ed3191f710ccf3b0afa5e67e353afe61262
                          • Instruction ID: 655c6eb068c7835b63414ef3c9938ae25085d91347c247b77763f6b5778615a8
                          • Opcode Fuzzy Hash: e64782263ff5605526e0fe757cea6ed3191f710ccf3b0afa5e67e353afe61262
                          • Instruction Fuzzy Hash: E301D8B954070466FF202A628C42B8B37585F51758F024137FD067D2D3E37E87748A4E
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??3@
                          • String ID:
                          • API String ID: 613200358-0
                          • Opcode ID: 61b661c510ad4b0743117b2440ebaa6c68aec67bf7d0c3759525eee1844cf9ab
                          • Instruction ID: 5b630ca211e00ee6ab232d4f5fe81ba50f7f923f282134244f429d4b925a3085
                          • Opcode Fuzzy Hash: 61b661c510ad4b0743117b2440ebaa6c68aec67bf7d0c3759525eee1844cf9ab
                          • Instruction Fuzzy Hash: 7501A272E0AD31A7E1257A76554135BE3686F04B29F05024FB904772428B6C7C5445DE
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetClientRect.USER32(?,?), ref: 004016A2
                          • GetSystemMetrics.USER32(00000015), ref: 004016B0
                          • GetSystemMetrics.USER32(00000014), ref: 004016BC
                          • BeginPaint.USER32(?,?), ref: 004016D6
                          • DrawFrameControl.USER32(00000000,?,00000003,00000008), ref: 004016E5
                          • EndPaint.USER32(?,?), ref: 004016F2
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: MetricsPaintSystem$BeginClientControlDrawFrameRect
                          • String ID:
                          • API String ID: 19018683-0
                          • Opcode ID: d93d450dc478f7866c229f4a037813e0caab4cabbf567c971482d52d831a5164
                          • Instruction ID: 724a62348f30ed3062fc78c586e299175c66965872e24402369681ac2eeab922
                          • Opcode Fuzzy Hash: d93d450dc478f7866c229f4a037813e0caab4cabbf567c971482d52d831a5164
                          • Instruction Fuzzy Hash: 0701FB76900619AFDF04DFA8DC499FE7BBDFB45301F00046AEA11AB295DAB1A914CF90
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • SetFocus.USER32(?,?,?), ref: 0040C3F8
                          • InvalidateRect.USER32(?,00000000,00000000), ref: 0040C4F5
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: FocusInvalidateRect
                          • String ID: XgD$rY@$u
                          • API String ID: 2103766487-1306415738
                          • Opcode ID: 0547b1f3527a77a0dd6e05b9ba2639b12fbf26f65146718a21d2de361d27d990
                          • Instruction ID: f774ea8d8eb1800fd2ad86f321479c1d669f6cdc6fcff53b53818c93aeeaee42
                          • Opcode Fuzzy Hash: 0547b1f3527a77a0dd6e05b9ba2639b12fbf26f65146718a21d2de361d27d990
                          • Instruction Fuzzy Hash: 6F518630A04701DBCB34BB658885D9AB3E0BF51724F44C63FF4656B2E2C779A9818B8D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memset.MSVCRT ref: 00406376
                          • memcpy.MSVCRT ref: 00406389
                          • memcpy.MSVCRT ref: 0040639C
                            • Part of subcall function 00404883: memset.MSVCRT ref: 004048BD
                            • Part of subcall function 00404883: memset.MSVCRT ref: 004048D1
                            • Part of subcall function 00404883: memset.MSVCRT ref: 004048E5
                            • Part of subcall function 00404883: memcpy.MSVCRT ref: 004048F7
                            • Part of subcall function 00404883: memcpy.MSVCRT ref: 00404909
                          • memcpy.MSVCRT ref: 004063E0
                          • memcpy.MSVCRT ref: 004063F3
                          • memcpy.MSVCRT ref: 00406420
                          • memcpy.MSVCRT ref: 00406435
                            • Part of subcall function 0040625B: memcpy.MSVCRT ref: 00406287
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memcpy$memset
                          • String ID:
                          • API String ID: 438689982-0
                          • Opcode ID: c11b14cc7bfefcbecd474d69538c451392e9e517f6ba4719ba6800d6460efb6e
                          • Instruction ID: a962c966a65fcbb98db0a5903e2df7d2d9caef1a51b72161af640e80cc8fe1a9
                          • Opcode Fuzzy Hash: c11b14cc7bfefcbecd474d69538c451392e9e517f6ba4719ba6800d6460efb6e
                          • Instruction Fuzzy Hash: 744140B290050DBEEB51DAE8CC41EEFBB7CAB4C704F004476F704F6051E635AA598BA6
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memset.MSVCRT ref: 00443E43
                          • memset.MSVCRT ref: 00443E5C
                          • memset.MSVCRT ref: 00443E70
                            • Part of subcall function 00443946: strlen.MSVCRT ref: 00443953
                          • strlen.MSVCRT ref: 00443E8C
                          • memcpy.MSVCRT ref: 00443EB1
                          • memcpy.MSVCRT ref: 00443EC7
                            • Part of subcall function 0040CF27: memcpy.MSVCRT ref: 0040CFB8
                            • Part of subcall function 0040CFC5: memset.MSVCRT ref: 0040CFE4
                            • Part of subcall function 0040CFC5: memset.MSVCRT ref: 0040CFFA
                            • Part of subcall function 0040CFC5: memcpy.MSVCRT ref: 0040D031
                            • Part of subcall function 0040CFC5: memset.MSVCRT ref: 0040D03B
                          • memcpy.MSVCRT ref: 00443F07
                            • Part of subcall function 0040CF27: memcpy.MSVCRT ref: 0040CF6A
                            • Part of subcall function 0040CF27: memcpy.MSVCRT ref: 0040CF94
                            • Part of subcall function 0040CFC5: memset.MSVCRT ref: 0040D00C
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memcpymemset$strlen
                          • String ID:
                          • API String ID: 2142929671-0
                          • Opcode ID: 1fb1ec72e13faa5c4450662030dd608fc909945337c7cb58045cb7f4428127cf
                          • Instruction ID: 7aa756fa7cbdb75c5c05895f31091f080fe59031f56f6a961c38bdf577465876
                          • Opcode Fuzzy Hash: 1fb1ec72e13faa5c4450662030dd608fc909945337c7cb58045cb7f4428127cf
                          • Instruction Fuzzy Hash: 5D513BB290011EAADB10EF55CC81AEEB3B9BF44218F5445BAE509E7141EB34AB49CF94
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00404666: _mbscpy.MSVCRT ref: 004046B5
                            • Part of subcall function 004045D6: LoadLibraryA.KERNEL32(advapi32.dll,?,0040F07D,?,00000000), ref: 004045E3
                            • Part of subcall function 004045D6: GetProcAddress.KERNEL32(00000000,CredReadA), ref: 004045FC
                            • Part of subcall function 004045D6: GetProcAddress.KERNEL32(?,CredFree), ref: 00404608
                            • Part of subcall function 004045D6: GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404614
                            • Part of subcall function 004045D6: GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404620
                            • Part of subcall function 004045D6: GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 0040462C
                            • Part of subcall function 0040472F: LoadLibraryA.KERNELBASE(?,0040F08A,?,00000000), ref: 00404737
                            • Part of subcall function 0040472F: GetProcAddress.KERNEL32(00000000,?), ref: 0040474F
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000100,000000FF,00000000,00000000,?,?,?,?,00000000), ref: 0040F123
                          • strlen.MSVCRT ref: 0040F133
                          • _mbscpy.MSVCRT ref: 0040F144
                          • LocalFree.KERNEL32(00000000,?,00000000), ref: 0040F151
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: AddressProc$LibraryLoad_mbscpy$ByteCharFreeLocalMultiWidestrlen
                          • String ID: Passport.Net\*
                          • API String ID: 2329438634-3671122194
                          • Opcode ID: c0e35485f09b5a24e447f0910c227e843a67b38e8fc9a121e48f37b6dcdb3ffc
                          • Instruction ID: b181dd8ad3303716fcb3fe51c6d72bcd9c0cca2a33dd7682b011125bf867cc1e
                          • Opcode Fuzzy Hash: c0e35485f09b5a24e447f0910c227e843a67b38e8fc9a121e48f37b6dcdb3ffc
                          • Instruction Fuzzy Hash: B5316D76900109EBDB20EF96DD45EAEB7B9EF85701F0000BAE604E7291D7389A05CB68
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00403158: strchr.MSVCRT ref: 0040326D
                          • memset.MSVCRT ref: 004032FD
                          • GetPrivateProfileSectionA.KERNEL32(Personalities,?,000003FE,?), ref: 00403317
                          • strchr.MSVCRT ref: 0040334C
                            • Part of subcall function 004023D7: _mbsicmp.MSVCRT ref: 0040240F
                          • strlen.MSVCRT ref: 0040338E
                            • Part of subcall function 004023D7: _mbscmp.MSVCRT ref: 004023EB
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: strchr$PrivateProfileSection_mbscmp_mbsicmpmemsetstrlen
                          • String ID: Personalities
                          • API String ID: 2103853322-4287407858
                          • Opcode ID: 4d90838e2d1a2817d3f702c1c820bc4a99c4f205016c2976f5c78779a4109539
                          • Instruction ID: 94df084552130989d7eb446100fdb0be3a34b05fea2c71b6ffce82199638926a
                          • Opcode Fuzzy Hash: 4d90838e2d1a2817d3f702c1c820bc4a99c4f205016c2976f5c78779a4109539
                          • Instruction Fuzzy Hash: 5921BA71B04158AADB11EF65DC81ADDBB6C9F10309F1400BBFA44F7281DA78DB46866D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • UuidFromStringA.RPCRT4(5e7e8100-9138-11d1-945a-00c04fc308ff,?), ref: 004101EF
                          • UuidFromStringA.RPCRT4(00000000-0000-0000-0000-000000000000,?), ref: 004101FC
                          • memcpy.MSVCRT ref: 00410238
                          Strings
                          • 00000000-0000-0000-0000-000000000000, xrefs: 004101F7
                          • 5e7e8100-9138-11d1-945a-00c04fc308ff, xrefs: 004101EA
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: FromStringUuid$memcpy
                          • String ID: 00000000-0000-0000-0000-000000000000$5e7e8100-9138-11d1-945a-00c04fc308ff
                          • API String ID: 2859077140-3316789007
                          • Opcode ID: 47d2852bcb6be23f486a4ed132040bb4fca7e7f7f1bca8e0f8c40ade59038cba
                          • Instruction ID: ae29383cbd57fcea5ed56c9c200a46c16443c4e74b3f506479b718b79cf0bdd8
                          • Opcode Fuzzy Hash: 47d2852bcb6be23f486a4ed132040bb4fca7e7f7f1bca8e0f8c40ade59038cba
                          • Instruction Fuzzy Hash: 1801C43790001CBADF019B94CC40EEB7BACEF4A354F004023FD55D6141E678EA8487A5
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memset.MSVCRT ref: 00443A57
                            • Part of subcall function 00410411: RegOpenKeyExA.KERNELBASE(00401C4B,00401C4B,00000000,00020019,?,00401C4B,?,?,?), ref: 00410424
                            • Part of subcall function 00410452: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C69,?,?,?,?,00401C69,?,?,?), ref: 0041046D
                          • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,000003FF), ref: 00443AC3
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: CloseOpenQueryValuememset
                          • String ID: EOptions string$Software\Yahoo\Pager$Yahoo! User ID
                          • API String ID: 1830152886-1703613266
                          • Opcode ID: 650c04e09b991093e9736741da7e0d3a8797bac6cd011315facee49111a37a9d
                          • Instruction ID: 86b235c3fd45d03c271013e996efd952a38f3d6ae4618920ee3f021b32bc4f63
                          • Opcode Fuzzy Hash: 650c04e09b991093e9736741da7e0d3a8797bac6cd011315facee49111a37a9d
                          • Instruction Fuzzy Hash: 500192B6900118BBEB10AA55CD01FAE7A6C9F90715F140076FF08F2212E379DF5587A9
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memset.MSVCRT ref: 0040BFE7
                          • SetFocus.USER32(?,?), ref: 0040C06F
                            • Part of subcall function 0040BFB1: PostMessageA.USER32(?,00000415,00000000,00000000), ref: 0040BFC0
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: FocusMessagePostmemset
                          • String ID: +_@$l$u
                          • API String ID: 3436799508-1256668747
                          • Opcode ID: 5d19dabe06c04104d03c805a20db61bb7ad0843c3c7d2444441ab514d0ecd962
                          • Instruction ID: dfa99e5f235914639cafa3f1faff2c73f9381d0964b1719e4b49f1177e3774cc
                          • Opcode Fuzzy Hash: 5d19dabe06c04104d03c805a20db61bb7ad0843c3c7d2444441ab514d0ecd962
                          • Instruction Fuzzy Hash: B411A172904198CBDF209B24CC44BCA7BB9AF90304F0900F5A94C7B2D2C7B55E89CFA9
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memset.MSVCRT ref: 00409031
                          • GetPrivateProfileStringA.KERNEL32(00451308,0000000A,0044551F,?,00001000,00451200), ref: 00409053
                          • _mbscpy.MSVCRT ref: 0040906D
                          Strings
                          • <html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>, xrefs: 0040901A
                          • {?@ UD, xrefs: 0040900D
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: PrivateProfileString_mbscpymemset
                          • String ID: <html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>${?@ UD
                          • API String ID: 408644273-2682877464
                          • Opcode ID: 378cf609773933abd0cbf0de7e3743951131b1a096d6e983a9466431b2c11096
                          • Instruction ID: 644781a60c69e86f7c2c511092586478b4ed4a6ca21543a67b17e89033411e60
                          • Opcode Fuzzy Hash: 378cf609773933abd0cbf0de7e3743951131b1a096d6e983a9466431b2c11096
                          • Instruction Fuzzy Hash: 53F0E9729041987BEB129764EC01FCA77AC9B4974BF1000E6FB49F10C2D5F89EC48AAD
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memset.MSVCRT ref: 00408F5D
                          • sprintf.MSVCRT ref: 00408F72
                            • Part of subcall function 0040900D: memset.MSVCRT ref: 00409031
                            • Part of subcall function 0040900D: GetPrivateProfileStringA.KERNEL32(00451308,0000000A,0044551F,?,00001000,00451200), ref: 00409053
                            • Part of subcall function 0040900D: _mbscpy.MSVCRT ref: 0040906D
                          • SetWindowTextA.USER32(?,?), ref: 00408F99
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset$PrivateProfileStringTextWindow_mbscpysprintf
                          • String ID: caption$dialog_%d
                          • API String ID: 336690586-4161923789
                          • Opcode ID: 000f1f906e92f5b03bb8d936c1600f8ee9725489ffd6e52dafee9c1c18951f52
                          • Instruction ID: 5193b431d0dc7ecedf7a364b2ddef3fe6b5aec68a3d00ff581056cac6fb231a4
                          • Opcode Fuzzy Hash: 000f1f906e92f5b03bb8d936c1600f8ee9725489ffd6e52dafee9c1c18951f52
                          • Instruction Fuzzy Hash: 67F0BB745043487FFB129BA0DD06FC97AA8AB08747F0000A6BB44F11E2DBF899908B5E
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • LoadLibraryA.KERNEL32(shlwapi.dll,000003ED,774148C0,00405E9E,00000000), ref: 00410912
                          • GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 00410920
                          • FreeLibrary.KERNEL32(00000000), ref: 00410938
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: Library$AddressFreeLoadProc
                          • String ID: SHAutoComplete$shlwapi.dll
                          • API String ID: 145871493-1506664499
                          • Opcode ID: f25734f4fc4b11147bd7f5e2528d9bf4594faa664b5814fe0a2756d8d7966d13
                          • Instruction ID: 7569959bf229cfaf5f1ab8cb2858e1476927bfd88fe16924fdc565eaa6c9b3dd
                          • Opcode Fuzzy Hash: f25734f4fc4b11147bd7f5e2528d9bf4594faa664b5814fe0a2756d8d7966d13
                          • Instruction Fuzzy Hash: 15D05B797006107BFB215735BC08FEF6AE5DFC77527050035F950E1151CB648C42896A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset$memcpy
                          • String ID: $no query solution
                          • API String ID: 368790112-326442043
                          • Opcode ID: d1b20270b8fca8508a10612e54657d8b0a662355ac249add9ed08d121aaec26c
                          • Instruction ID: 5801c9734c6bd427e286c4e355069e6ae2e92931dd4aa2b8c604a71db9229eec
                          • Opcode Fuzzy Hash: d1b20270b8fca8508a10612e54657d8b0a662355ac249add9ed08d121aaec26c
                          • Instruction Fuzzy Hash: D012AC75D006199FCB24CF99D481AAEF7F1FF08314F14915EE899AB351E338A981CB98
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          • unknown column "%s" in foreign key definition, xrefs: 0043027A
                          • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 00430087
                          • foreign key on %s should reference only one column of table %T, xrefs: 0043005F
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memcpy
                          • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                          • API String ID: 3510742995-272990098
                          • Opcode ID: ba7cc926a2513b3f0d61d7686d9ea4b43c1dda64fb95451b7aee5590be9ae86f
                          • Instruction ID: b65499b1f20d22348a3d217da3c858198d90c87fbf4aa33eef889ec12c855700
                          • Opcode Fuzzy Hash: ba7cc926a2513b3f0d61d7686d9ea4b43c1dda64fb95451b7aee5590be9ae86f
                          • Instruction Fuzzy Hash: BFA14C75A00209DFCB14CF99D590AAEBBF1FF48304F14869AE805AB312D779EE51CB94
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset
                          • String ID: H
                          • API String ID: 2221118986-2852464175
                          • Opcode ID: 82ed15864ef5b3a3dd0266e33bdbcb26a787e81eb1be7ca6d5995a5f4ce5c711
                          • Instruction ID: 0231d824907604898156c72f74438a53b00a2a6e63cdef361d574d9feb60fc4e
                          • Opcode Fuzzy Hash: 82ed15864ef5b3a3dd0266e33bdbcb26a787e81eb1be7ca6d5995a5f4ce5c711
                          • Instruction Fuzzy Hash: 9D915775C00219DBDF20CF95C881AAEF7B5FF48304F14949AE959BB241E334AA85CFA5
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memcmp$memcpy
                          • String ID: @ $SQLite format 3
                          • API String ID: 231171946-3708268960
                          • Opcode ID: 5952f075a97c97ad06d3c6058b6006b849409e8323ae21947051dcee29b786b4
                          • Instruction ID: 154dd893183b882ddc8616fc7eef56b16fb129afe1b119523047def7d92feb70
                          • Opcode Fuzzy Hash: 5952f075a97c97ad06d3c6058b6006b849409e8323ae21947051dcee29b786b4
                          • Instruction Fuzzy Hash: C451B1B1E00604AFDB20DF69C881BDAB7F5AF54308F14056FD44597741E778EA84CBA9
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memcpy
                          • String ID: out of memory$statement aborts at %d: [%s] %s$string or blob too big
                          • API String ID: 3510742995-3170954634
                          • Opcode ID: d7603b0dda69ecf518d4b766e7e4f504cd7a7b4266dab8eccfe297bae9d2bc32
                          • Instruction ID: 0d7bce0817bf65c9dfa0535c92c7df176da35528cc665cc261d5cec065e4eab6
                          • Opcode Fuzzy Hash: d7603b0dda69ecf518d4b766e7e4f504cd7a7b4266dab8eccfe297bae9d2bc32
                          • Instruction Fuzzy Hash: 4361C031A046259FDB14DFA4D480BAEBBF1FF48304F55849AE904AB392D738ED51CB98
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memcpy$memset
                          • String ID: winWrite1$winWrite2
                          • API String ID: 438689982-3457389245
                          • Opcode ID: 0d7f83051426e72d393f7901bd0e4f2f845d9ffb714df67e86fd0046f80122d9
                          • Instruction ID: 411cc920c71d47ae3c136763a4be7e00f30539a89a3c59ace8e577baf045dca9
                          • Opcode Fuzzy Hash: 0d7f83051426e72d393f7901bd0e4f2f845d9ffb714df67e86fd0046f80122d9
                          • Instruction Fuzzy Hash: F9417F72A00209EBDF00CF95CC41ADE7BB5FF48315F14452AF614A7280D778DAA5CB99
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memcpymemset
                          • String ID: winRead
                          • API String ID: 1297977491-2759563040
                          • Opcode ID: ffe010aae32d2fe9b2a966a78d406535a1fbcfae657499b63a226c622339ee24
                          • Instruction ID: 3967e01906e40ec71704122980e40950556eef8199585a058b54f4718b0c424a
                          • Opcode Fuzzy Hash: ffe010aae32d2fe9b2a966a78d406535a1fbcfae657499b63a226c622339ee24
                          • Instruction Fuzzy Hash: 46318B72A00309ABDF10DE69CC86ADE7B69AF84315F14446AF904A7241D734DAA48B99
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetSystemMetrics.USER32(00000011), ref: 00407076
                          • GetSystemMetrics.USER32(00000010), ref: 0040707C
                          • 73BBAC50.USER32(00000000,?,?,?,?,?,?,004012E4,?), ref: 0040708A
                          • GetWindowRect.USER32(004012E4,?), ref: 004070BB
                          • MoveWindow.USER32(004012E4,?,?,?,?,00000001,?,?,?,?,?,?,004012E4,?), ref: 00407100
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: MetricsSystemWindow$MoveRect
                          • String ID:
                          • API String ID: 514606546-0
                          • Opcode ID: 9f21f5323b7ceedafff5760536b34980224d30b32341e91405141b8b8f897059
                          • Instruction ID: 4d379cb21657894a0e11cf9a22620d5233689a1bec75a9944306807f4dd79964
                          • Opcode Fuzzy Hash: 9f21f5323b7ceedafff5760536b34980224d30b32341e91405141b8b8f897059
                          • Instruction Fuzzy Hash: 8F11B735E00619AFDF108FB8CC49BAF7F79EB45351F040135EE01E7291DA70A9048A91
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00406AD1: strlen.MSVCRT ref: 00406ADE
                            • Part of subcall function 00406AD1: WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,0040A8D9,?,<item>), ref: 00406AEB
                          • memset.MSVCRT ref: 0040A8F8
                            • Part of subcall function 0041096F: memcpy.MSVCRT ref: 004109DD
                            • Part of subcall function 0040A245: _mbscpy.MSVCRT ref: 0040A24A
                            • Part of subcall function 0040A245: _strlwr.MSVCRT ref: 0040A28D
                          • sprintf.MSVCRT ref: 0040A93D
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: FileWrite_mbscpy_strlwrmemcpymemsetsprintfstrlen
                          • String ID: <%s>%s</%s>$</item>$<item>
                          • API String ID: 3337535707-2769808009
                          • Opcode ID: b0ab3c576635bf4da161b26e96517a42775f10b149b223ac01af6493df536d2f
                          • Instruction ID: b3463478cabe4832a9b1b799bbf2f925c18d395200ae258af25e9b21d14a16f2
                          • Opcode Fuzzy Hash: b0ab3c576635bf4da161b26e96517a42775f10b149b223ac01af6493df536d2f
                          • Instruction Fuzzy Hash: 3611BF31600225BFEB11AF64CC42F957B64FF04318F10406AF509265A2DB7ABD70DB89
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: _mbscat$memsetsprintf
                          • String ID:
                          • API String ID: 125969286-0
                          • Opcode ID: cfc2cdd9402285d373237ff41ddaadf9cb54e449d46b0907ea735e806236394e
                          • Instruction ID: 1eb43bd5b8120d09ab0b11fdee56c07fa856cfecb869048c22175c4298d2535e
                          • Opcode Fuzzy Hash: cfc2cdd9402285d373237ff41ddaadf9cb54e449d46b0907ea735e806236394e
                          • Instruction Fuzzy Hash: EF014C32D0826436F72156159C03BBB77A89B85704F10407FFD44A92C1EEBCE984479A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetParent.USER32(?), ref: 00408E33
                          • GetWindowRect.USER32(?,?), ref: 00408E40
                          • GetClientRect.USER32(00000000,?), ref: 00408E4B
                          • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 00408E5B
                          • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 00408E77
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: Window$Rect$ClientParentPoints
                          • String ID:
                          • API String ID: 4247780290-0
                          • Opcode ID: 06bcd35f29f4ad8b1f8be6fafa23155ea8198cc34ea2cee51d518efb77a86cea
                          • Instruction ID: d5d25afb3259b03ed1d628add5c616d0d22dc24c96253af88726d5856d44a725
                          • Opcode Fuzzy Hash: 06bcd35f29f4ad8b1f8be6fafa23155ea8198cc34ea2cee51d518efb77a86cea
                          • Instruction Fuzzy Hash: 0E01653680052ABBDB11ABA59C49EFFBFBCFF06750F04402AFD05A2181D77895018BA5
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memset.MSVCRT ref: 0040AAB7
                          • memset.MSVCRT ref: 0040AACD
                            • Part of subcall function 00406AD1: strlen.MSVCRT ref: 00406ADE
                            • Part of subcall function 00406AD1: WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,0040A8D9,?,<item>), ref: 00406AEB
                            • Part of subcall function 0040A245: _mbscpy.MSVCRT ref: 0040A24A
                            • Part of subcall function 0040A245: _strlwr.MSVCRT ref: 0040A28D
                          • sprintf.MSVCRT ref: 0040AB04
                          Strings
                          • <%s>, xrefs: 0040AAFE
                          • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 0040AAD2
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset$FileWrite_mbscpy_strlwrsprintfstrlen
                          • String ID: <%s>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                          • API String ID: 3699762281-1998499579
                          • Opcode ID: d5ee42966936a1138623645e18684dfcccb61381e14bbb228212885f4d89bd19
                          • Instruction ID: a3dff73391336119dc4caae329f843e57b3ce466119e41e431a2bb454e721b3a
                          • Opcode Fuzzy Hash: d5ee42966936a1138623645e18684dfcccb61381e14bbb228212885f4d89bd19
                          • Instruction Fuzzy Hash: ED01F7729401296AEB20B655CC45FDA7A6CAF45305F0400BAB509B2182DBB49E548BA5
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??3@
                          • String ID:
                          • API String ID: 613200358-0
                          • Opcode ID: 7a9d4f54567c0a48d1859bf8158ae1996b1b95a3d5575a953b4da3af230d69c1
                          • Instruction ID: ea629a9aafeff6281071dae141f51b3a8c797cef86d835f03ce988520f4efe7f
                          • Opcode Fuzzy Hash: 7a9d4f54567c0a48d1859bf8158ae1996b1b95a3d5575a953b4da3af230d69c1
                          • Instruction Fuzzy Hash: 94F0FF73609B01DBD7209FA99AC065BF7E9AB48724BA4093FF149D3642C738BC54C618
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 0040979F: ??3@YAXPAX@Z.MSVCRT ref: 004097AB
                            • Part of subcall function 0040979F: ??3@YAXPAX@Z.MSVCRT ref: 004097B9
                            • Part of subcall function 0040979F: ??3@YAXPAX@Z.MSVCRT ref: 004097CA
                            • Part of subcall function 0040979F: ??3@YAXPAX@Z.MSVCRT ref: 004097E1
                            • Part of subcall function 0040979F: ??3@YAXPAX@Z.MSVCRT ref: 004097EA
                          • ??3@YAXPAX@Z.MSVCRT ref: 00409820
                          • ??3@YAXPAX@Z.MSVCRT ref: 00409833
                          • ??3@YAXPAX@Z.MSVCRT ref: 00409846
                          • ??3@YAXPAX@Z.MSVCRT ref: 00409859
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040986D
                            • Part of subcall function 004077E4: ??3@YAXPAX@Z.MSVCRT ref: 004077EB
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??3@
                          • String ID:
                          • API String ID: 613200358-0
                          • Opcode ID: d9c01388865c204718a59a81bbac89ec1da5725ce67048d786a5844de5934490
                          • Instruction ID: 7a7d368fa20b86f0ae4ccc19201ff918d3b0396c1b4e5cf9e7c68f971a3fafa8
                          • Opcode Fuzzy Hash: d9c01388865c204718a59a81bbac89ec1da5725ce67048d786a5844de5934490
                          • Instruction Fuzzy Hash: 29F03633D1A930D7C6257B66500164EE3686E86B3931942AFF9047B7D28F3C7C5485DE
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00406EA5: memset.MSVCRT ref: 00406EC5
                            • Part of subcall function 00406EA5: GetClassNameA.USER32(?,00000000,000000FF), ref: 00406ED8
                            • Part of subcall function 00406EA5: _strcmpi.MSVCRT ref: 00406EEA
                          • SetBkMode.GDI32(?,00000001), ref: 00410113
                          • GetSysColor.USER32(00000005), ref: 0041011B
                          • SetBkColor.GDI32(?,00000000), ref: 00410125
                          • SetTextColor.GDI32(?,00C00000), ref: 00410133
                          • GetSysColorBrush.USER32(00000005), ref: 0041013B
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: Color$BrushClassModeNameText_strcmpimemset
                          • String ID:
                          • API String ID: 2775283111-0
                          • Opcode ID: 627087e029a1abcb04561e415bb5884c82ccbbb1204662b743e4c0e852913d63
                          • Instruction ID: 15b5804eddbfc7b45e8a586a0394ac07707e7803bdc14c23b44bbc646b24dc1f
                          • Opcode Fuzzy Hash: 627087e029a1abcb04561e415bb5884c82ccbbb1204662b743e4c0e852913d63
                          • Instruction Fuzzy Hash: 7DF0F935100508BBDF116FA5DC09EDE3B25FF05711F10813AFA15585B1CBFAD9A09B58
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • BeginDeferWindowPos.USER32(0000000A), ref: 00405F44
                            • Part of subcall function 004015F3: GetDlgItem.USER32(?,?), ref: 00401603
                            • Part of subcall function 004015F3: GetClientRect.USER32(?,?), ref: 00401615
                            • Part of subcall function 004015F3: DeferWindowPos.USER32(?,?,00000000,?,?,?,?,00000004), ref: 0040167F
                          • EndDeferWindowPos.USER32(?), ref: 00406003
                          • InvalidateRect.USER32(?,?,00000001), ref: 0040600E
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: DeferWindow$Rect$BeginClientInvalidateItem
                          • String ID: $
                          • API String ID: 2498372239-3993045852
                          • Opcode ID: 4f29eeeafaf0275d54e1a8ac864168a2c968bf72d4383311267dcf3585429308
                          • Instruction ID: 00843a31076853278f863d8e49a3b1dedc6e53575b175ed212c8a3462f8966d2
                          • Opcode Fuzzy Hash: 4f29eeeafaf0275d54e1a8ac864168a2c968bf72d4383311267dcf3585429308
                          • Instruction Fuzzy Hash: 4D318F70640259BFEF229B52DC89D6F3A7CFBC5B88F10006DF401792A1CA794F51EA69
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00414105
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                          • String ID: winSeekFile$winTruncate1$winTruncate2
                          • API String ID: 885266447-2471937615
                          • Opcode ID: 2e15f3014d93f2bb9130e9841e4fb77219e446d9f82deb2689d2d98ee362e802
                          • Instruction ID: 64d4eb81a265c1b05a2fdfc4674ac580571b80d59954343c28d6466173863d6d
                          • Opcode Fuzzy Hash: 2e15f3014d93f2bb9130e9841e4fb77219e446d9f82deb2689d2d98ee362e802
                          • Instruction Fuzzy Hash: 0331E1B1240700BFE7209F65CC49AA7B7E9FB94714F144A2EF951836C1E738EC948B69
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00406A9F: CreateFileA.KERNEL32(R7D,80000000,00000001,00000000,00000003,00000000,00000000,0044368E,?,.8D,00443752,?,?,*.oeaccount,.8D,?), ref: 00406AB1
                          • GetFileSize.KERNEL32(00000000,00000000,key3.db,00000143,00000000,C@,004069F3,00000000,?,?,00000000), ref: 0040688C
                          • CloseHandle.KERNEL32(?), ref: 004068B2
                            • Part of subcall function 00407691: ??3@YAXPAX@Z.MSVCRT ref: 00407698
                            • Part of subcall function 00407691: ??2@YAPAXI@Z.MSVCRT ref: 004076A6
                            • Part of subcall function 004072EF: ReadFile.KERNEL32(00000000,?,004436D1,00000000,00000000,?,?,004436D1,?,00000000), ref: 00407306
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: File$??2@??3@CloseCreateHandleReadSize
                          • String ID: C@$key3.db
                          • API String ID: 1968906679-1993167907
                          • Opcode ID: 8070846350ac793f35cf726ef4b9da8142e130784681131c85812774ce581970
                          • Instruction ID: 0ede60c3f523747ec885d841e26685764e9001b1461c3323211a21065397dc39
                          • Opcode Fuzzy Hash: 8070846350ac793f35cf726ef4b9da8142e130784681131c85812774ce581970
                          • Instruction Fuzzy Hash: 9811D3B2D00514AFDB10AF19CC4588E7BA5EF46360B12807BF80AAB291DB34DD60CB98
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00410411: RegOpenKeyExA.KERNELBASE(00401C4B,00401C4B,00000000,00020019,?,00401C4B,?,?,?), ref: 00410424
                          • memset.MSVCRT ref: 00407FCE
                            • Part of subcall function 004104D7: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 004104FA
                          • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,000000FF,?,?,?), ref: 0040801C
                          • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,000000FF,?,?,?), ref: 00408039
                          Strings
                          • Software\Google\Google Desktop\Mailboxes, xrefs: 00407FA6
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: Close$EnumOpenmemset
                          • String ID: Software\Google\Google Desktop\Mailboxes
                          • API String ID: 2255314230-2212045309
                          • Opcode ID: cddc1c4639ed352c6b00522a74a8640079b1fef2a24954c474c6d8e722691f2e
                          • Instruction ID: ef1d8a4e040050e039b627d4d2b4e2291b822c72ed16119247eb6dd3c2076bbf
                          • Opcode Fuzzy Hash: cddc1c4639ed352c6b00522a74a8640079b1fef2a24954c474c6d8e722691f2e
                          • Instruction Fuzzy Hash: 4A118F72408245BBD710EE51DC41EABBBACEBD0314F00083EBE9491191EB759A58D7A7
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00406D65: memset.MSVCRT ref: 00406D6F
                            • Part of subcall function 00406D65: _mbscpy.MSVCRT ref: 00406DAF
                          • CreateFontIndirectA.GDI32(?), ref: 0040101F
                          • SendDlgItemMessageA.USER32(?,000003EC,00000030,00000000,00000000), ref: 0040103E
                          • SendDlgItemMessageA.USER32(?,000003EE,00000030,?,00000000), ref: 0040105B
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: ItemMessageSend$CreateFontIndirect_mbscpymemset
                          • String ID: MS Sans Serif
                          • API String ID: 3492281209-168460110
                          • Opcode ID: 2b978f582ba89fecee05bf5e4b747a5653f5ca03fd4d42c103354d0125bbd5b3
                          • Instruction ID: 91d7546927304a6081eb6d9f577e17eac68e9825403057b28fc40c6b5cfff950
                          • Opcode Fuzzy Hash: 2b978f582ba89fecee05bf5e4b747a5653f5ca03fd4d42c103354d0125bbd5b3
                          • Instruction Fuzzy Hash: 54F0A775A407047BEB3267A0EC47F4A7BACAB41B41F104535F651B51F2D6F4B544CB48
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: ClassName_strcmpimemset
                          • String ID: edit
                          • API String ID: 275601554-2167791130
                          • Opcode ID: ed2b804169d995c812202dfe57b894f8811318f38427dff4b8ba9102b7fae148
                          • Instruction ID: 847e1e856ca93c5331a43762777f09d1dcd0b535ae5450603ebfd434222f9f24
                          • Opcode Fuzzy Hash: ed2b804169d995c812202dfe57b894f8811318f38427dff4b8ba9102b7fae148
                          • Instruction Fuzzy Hash: A3E09B73C5412E7AEB21B6A4DC01FE6776CEF55705F0000F7B945E10C1E5B45A888B95
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: strlen$_mbscat
                          • String ID: 8D
                          • API String ID: 3951308622-2703402624
                          • Opcode ID: 0ec1879d80d4c340dda7a3243aeb4a8038102bdf29c15a79d9befc878d316230
                          • Instruction ID: fdb3abcae466a204d6f595596d606a7769775cd3d87c53e6d0f7ff6b17e0c5bf
                          • Opcode Fuzzy Hash: 0ec1879d80d4c340dda7a3243aeb4a8038102bdf29c15a79d9befc878d316230
                          • Instruction Fuzzy Hash: F7D0A73390D62027F6153617BC07D8E5BD1CFD0779B18041FF908D2181DD3E8495909D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: _mbscat$_mbscpy
                          • String ID: Password2
                          • API String ID: 2600922555-1856559283
                          • Opcode ID: dd6d1596d5adc5cb59be199e9a5e42366e44826479dad9da6a8aaa41d84d8c14
                          • Instruction ID: 284e3ed20e01ed0f985c27cc48ee8d5f57cf04e2e68a318951e5723102309710
                          • Opcode Fuzzy Hash: dd6d1596d5adc5cb59be199e9a5e42366e44826479dad9da6a8aaa41d84d8c14
                          • Instruction Fuzzy Hash: DFC0126164253032351132152C02ECE5D444D927A9744405BF64871152DE4C092141EE
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • LoadLibraryA.KERNEL32(shell32.dll,0041073A,00000104), ref: 0041068C
                          • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathA), ref: 004106A1
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: SHGetSpecialFolderPathA$shell32.dll
                          • API String ID: 2574300362-543337301
                          • Opcode ID: 2e6b26bb17626f4397607e962d7e33e0088331342153929cca1aec3e07a9d3dc
                          • Instruction ID: 89c53fa068d5e839e9f7b52beb2d5746c1b59f0700db89f23453b1bd6c0da6b7
                          • Opcode Fuzzy Hash: 2e6b26bb17626f4397607e962d7e33e0088331342153929cca1aec3e07a9d3dc
                          • Instruction Fuzzy Hash: 31D09EB8A00349EFDB00AF21EC0874639946785756B104436A04591267E6B88091CE5D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset
                          • String ID: rows deleted
                          • API String ID: 2221118986-571615504
                          • Opcode ID: 4c9dbc2b612ed9edf76401e4d6c70ac1deb0b9b48bbb52d81c4a8b84a7a8b6c2
                          • Instruction ID: 2c87624536f7d1d2c67b3f30ed48d8bcf82a012ac595ca9270874480dc5e5985
                          • Opcode Fuzzy Hash: 4c9dbc2b612ed9edf76401e4d6c70ac1deb0b9b48bbb52d81c4a8b84a7a8b6c2
                          • Instruction Fuzzy Hash: 47028F71E00218AFDF14DF99DD81AAEBBB5EF08314F14005AFA04A7352E775AD41CB99
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memcpy$memcmp
                          • String ID:
                          • API String ID: 3384217055-0
                          • Opcode ID: e3acc2376955a3743a68dcdfb4fb7f0e30d5fba998ed12fb16b657197a27482f
                          • Instruction ID: 3ed27bb9f02c74045d0acb38b61796dbe98832ce2e8f1163f6a46f85a071a1b4
                          • Opcode Fuzzy Hash: e3acc2376955a3743a68dcdfb4fb7f0e30d5fba998ed12fb16b657197a27482f
                          • Instruction Fuzzy Hash: C62181B2E106486BDB14DBA5D846EDF73ECEB94704F04082AB511D7241EB38E644C765
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??2@$memset
                          • String ID:
                          • API String ID: 1860491036-0
                          • Opcode ID: 378dd395ac358383f0d1e4d3a7a78962b5737c649db7fc2e5d38c36609a1d53f
                          • Instruction ID: ce7ce7a56e3d2054f407bfc67449f4b5e2a26b1e03fcf19820fefdebefcb5e48
                          • Opcode Fuzzy Hash: 378dd395ac358383f0d1e4d3a7a78962b5737c649db7fc2e5d38c36609a1d53f
                          • Instruction Fuzzy Hash: D3312BF4A007008FE7509F7A8945626FBE4FF84315F65886FE259CB2A2D7B9D440CB29
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset$memcpy
                          • String ID:
                          • API String ID: 368790112-0
                          • Opcode ID: a75b1e0acb0f5019c960ead13ae6bdef512e97a5dc6b2f82c9c12f4a65331388
                          • Instruction ID: 580d5568a0ae36357fe55cd2f8a92ca16a000ad3cc3fb0fce8e347f768f52ea1
                          • Opcode Fuzzy Hash: a75b1e0acb0f5019c960ead13ae6bdef512e97a5dc6b2f82c9c12f4a65331388
                          • Instruction Fuzzy Hash: B02160B690115DABDF21EEA8CD40EDF7BADAF88304F0044AAB718E3052D2349F548B64
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset$memcpy
                          • String ID:
                          • API String ID: 368790112-0
                          • Opcode ID: c734dfea12c93efd70da344448ab0c1d4400440b23c7d083a28a0ad16e48a0bf
                          • Instruction ID: 593c26daf5a8157ef64f6677eb97e14ee4fb597551c84e1e3d2c0423d94ab2b3
                          • Opcode Fuzzy Hash: c734dfea12c93efd70da344448ab0c1d4400440b23c7d083a28a0ad16e48a0bf
                          • Instruction Fuzzy Hash: DE01FCB5A40B0077E235AA35CC03F1A73A4AFD1718F000B1EF252666D2E7BCE509856D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset
                          • String ID: +MA$psow$winOpen
                          • API String ID: 2221118986-3077801942
                          • Opcode ID: 6374b3f40517461fab9b1732b79d6ecb0a63dddf6689f58e7f4b53c344f2d528
                          • Instruction ID: 627c4099ad4ed317c867b58951a0fc316b0cffc8f2319acf44b2ebd0553f51b9
                          • Opcode Fuzzy Hash: 6374b3f40517461fab9b1732b79d6ecb0a63dddf6689f58e7f4b53c344f2d528
                          • Instruction Fuzzy Hash: DE718D72D00605EBDF10DFA9DC426DEBBB2AF44314F14412BF915AB291D7788D908B98
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • __allrem.LIBCMT ref: 00424F52
                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00424F87
                          • __allrem.LIBCMT ref: 00425035
                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0042507D
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                          • String ID:
                          • API String ID: 1992179935-0
                          • Opcode ID: 560e0d92d15042a7d60853a487a4d693223dca75a8103b8e7d816dd0a212d02a
                          • Instruction ID: db9e41318fbfcada45bb9adf36b3998ede89feacb8141746dd807fa43e705e13
                          • Opcode Fuzzy Hash: 560e0d92d15042a7d60853a487a4d693223dca75a8103b8e7d816dd0a212d02a
                          • Instruction Fuzzy Hash: 65618F71E006299FCF14CFA4ED40AAEBBB1FF84314F69415AE508AB391DB399D41CB58
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          • variable number must be between ?1 and ?%d, xrefs: 0042BC19
                          • too many SQL variables, xrefs: 0042BD54
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset
                          • String ID: too many SQL variables$variable number must be between ?1 and ?%d
                          • API String ID: 2221118986-515162456
                          • Opcode ID: 6b88ecb26755f537598d44b059ba5a346278a106570852c9337f2aed9016ab7b
                          • Instruction ID: 0d9164a1fdbde5ca3cdd745d30cfe3dc8f536e44641e3c26b790e655cd3eaffd
                          • Opcode Fuzzy Hash: 6b88ecb26755f537598d44b059ba5a346278a106570852c9337f2aed9016ab7b
                          • Instruction Fuzzy Hash: 71519D31B00525EFEB19DF69D481BEAB7A0FF08304F90016BE815AB251DB79AD51CBC8
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memcpy
                          • String ID: $, $CREATE TABLE
                          • API String ID: 3510742995-3459038510
                          • Opcode ID: 24e9d051a89d5ebfc294a89d8b696b7cb09e4cb3b50fd414110b2fd0402450e3
                          • Instruction ID: 4a0871beed9f250e2dacaf6662beca46c80fe0be2f5bbb48e716de4f7c2f6e71
                          • Opcode Fuzzy Hash: 24e9d051a89d5ebfc294a89d8b696b7cb09e4cb3b50fd414110b2fd0402450e3
                          • Instruction Fuzzy Hash: BE51B471E00129AFDF10DF94D4815AFB7F5EF45319FA0806BE401EB202E778DA898B99
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00410475: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,0040264A,?), ref: 0041048B
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000,?,?,00000400,00000001), ref: 004026D6
                          • memset.MSVCRT ref: 0040269F
                            • Part of subcall function 0041025A: UuidFromStringA.RPCRT4(220D5CD0-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410277
                            • Part of subcall function 0041025A: UuidFromStringA.RPCRT4(417E2D75-84BD-11D0-84BB-00C04FD43F8F,?), ref: 00410298
                            • Part of subcall function 0041025A: memcpy.MSVCRT ref: 004102D6
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000002,?,0000007F,00000000,00000000,00000002,00000000,?), ref: 0040278E
                          • LocalFree.KERNEL32(?), ref: 00402798
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: ByteCharFromMultiStringUuidWide$FreeLocalQueryValuememcpymemset
                          • String ID:
                          • API String ID: 1593657333-0
                          • Opcode ID: 16627343bce6d9ca029ba30bb800e57eeae299e547cd663597d7650a0685579b
                          • Instruction ID: a31c39db536bf59591fe237cfeb45fd52263bcc442a3b4586f9b541b98436b80
                          • Opcode Fuzzy Hash: 16627343bce6d9ca029ba30bb800e57eeae299e547cd663597d7650a0685579b
                          • Instruction Fuzzy Hash: 0741C2B1408394AFEB21CF60CD85AAB77DCAB49304F04493FF588A21D1D6B9DA44CB5A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memset.MSVCRT ref: 0040C642
                          • SendMessageA.USER32(00000000,00000423,00000000,00000000), ref: 0040C686
                          • GetMenuStringA.USER32(?,00000103,?,0000004F,00000000), ref: 0040C6A0
                          • PostMessageA.USER32(?,00000402,00000000,00000000), ref: 0040C743
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: Message$MenuPostSendStringmemset
                          • String ID:
                          • API String ID: 3798638045-0
                          • Opcode ID: 3a7b9920eb43017b966caaa677d6f3b642cf6e436e0306de547793c3a41d1725
                          • Instruction ID: caf6f60f32b19a677c26e4d16bf675fa64e013cae5d841084b333b07d52aaaaa
                          • Opcode Fuzzy Hash: 3a7b9920eb43017b966caaa677d6f3b642cf6e436e0306de547793c3a41d1725
                          • Instruction Fuzzy Hash: 6C41C131500216EBCB35CF24C8C5A96BBA4BF05321F1447B6E958AB2D2C7B99D91CFD8
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00409B5A: ??2@YAPAXI@Z.MSVCRT ref: 00409B7B
                            • Part of subcall function 00409B5A: ??3@YAXPAX@Z.MSVCRT ref: 00409C42
                          • strlen.MSVCRT ref: 0040B366
                          • atoi.MSVCRT ref: 0040B374
                          • _mbsicmp.MSVCRT ref: 0040B3C7
                          • _mbsicmp.MSVCRT ref: 0040B3DA
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: _mbsicmp$??2@??3@atoistrlen
                          • String ID:
                          • API String ID: 4107816708-0
                          • Opcode ID: 8fdabe3cb48b7dd5393ce896bc272b4884b8954cc15d75e5f27a23b60337e2cc
                          • Instruction ID: f56b49caca625ffb6a8305ca332e6707e3f7b6555e2304d22037ac8df505f121
                          • Opcode Fuzzy Hash: 8fdabe3cb48b7dd5393ce896bc272b4884b8954cc15d75e5f27a23b60337e2cc
                          • Instruction Fuzzy Hash: CC412A75900204EBDB10DF69C581A9DBBF4FB48308F2185BAEC55AB397D738DA41CB98
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@_gmtime64memcpystrftime
                          • String ID:
                          • API String ID: 1886415126-0
                          • Opcode ID: 42ebb8c1e295c4f998c750dd4381f5a90e4aefd148bac4d8b35948d96f151cd4
                          • Instruction ID: e7bf39f2df778c647ef491fd25a44dd6e6c3fbccc626bed7fedf127605a46aa4
                          • Opcode Fuzzy Hash: 42ebb8c1e295c4f998c750dd4381f5a90e4aefd148bac4d8b35948d96f151cd4
                          • Instruction Fuzzy Hash: 8B21F3729003156BD310EF65D846B9BB7E8AF48324F044A1FFA98D7281DB78E9848BD5
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: strlen
                          • String ID: >$>$>
                          • API String ID: 39653677-3911187716
                          • Opcode ID: 3bef562ec1fa0c496d1df37275b1e68b1d7bde60f2b1f93b6d17329dd08051c1
                          • Instruction ID: c4e2884265c3a68fdd0446f239628287b972743a9c94721f5bed41ec85a51522
                          • Opcode Fuzzy Hash: 3bef562ec1fa0c496d1df37275b1e68b1d7bde60f2b1f93b6d17329dd08051c1
                          • Instruction Fuzzy Hash: 2A313A5184D2C49EFB119F6880457EEFFB14F22706F1886DAC0D167383C2AC9B4AD75A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memcpy
                          • String ID: @
                          • API String ID: 3510742995-2766056989
                          • Opcode ID: 06b8a3ec594aaba049a721ed4dda8e3acd4ed37df7d7103eefb9391fa1074ca8
                          • Instruction ID: c67b832eded58a7fed5fb718e1005b1d96f95c91eedcc3159726feab918c483c
                          • Opcode Fuzzy Hash: 06b8a3ec594aaba049a721ed4dda8e3acd4ed37df7d7103eefb9391fa1074ca8
                          • Instruction Fuzzy Hash: DB113BF2900705ABCB248F15CCC095A77A9EB94358B00073FFE06562D1E635DA5986DA
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • strlen.MSVCRT ref: 00407709
                          • ??3@YAXPAX@Z.MSVCRT ref: 00407729
                            • Part of subcall function 00406CCE: malloc.MSVCRT ref: 00406CEA
                            • Part of subcall function 00406CCE: memcpy.MSVCRT ref: 00406D02
                            • Part of subcall function 00406CCE: ??3@YAXPAX@Z.MSVCRT ref: 00406D0B
                          • ??3@YAXPAX@Z.MSVCRT ref: 0040774C
                          • memcpy.MSVCRT ref: 0040776C
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??3@$memcpy$mallocstrlen
                          • String ID:
                          • API String ID: 1171893557-0
                          • Opcode ID: 362879045fdc860860f3123a44022f3e2572d0f7ada27b379acf8bf4c70500ed
                          • Instruction ID: 5e9a081d75c64704428ce8041afbbeb9d52fcced2ab343c8e96fa08cc39daf7c
                          • Opcode Fuzzy Hash: 362879045fdc860860f3123a44022f3e2572d0f7ada27b379acf8bf4c70500ed
                          • Instruction Fuzzy Hash: E411DF71200600DFD730EF18D981D9AB7F5EF443247108A2EF552A7692C736B919CB54
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??2@??3@memcpymemset
                          • String ID:
                          • API String ID: 1865533344-0
                          • Opcode ID: 6af0d80cf1f9a4abb6ff5f9bc8d9616050e1b27e252b80ccf982e962f70df596
                          • Instruction ID: e24a5276dafad98c161ef6ad34afde8f808320b1c4234a0015a7989cc473ef50
                          • Opcode Fuzzy Hash: 6af0d80cf1f9a4abb6ff5f9bc8d9616050e1b27e252b80ccf982e962f70df596
                          • Instruction Fuzzy Hash: 12118C71608601AFD328CF2DC881A27F7E9FFD8300B20892EE59A87395DA35E801CB15
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • SHGetMalloc.SHELL32(?), ref: 00410890
                          • SHBrowseForFolder.SHELL32(?), ref: 004108C2
                          • SHGetPathFromIDList.SHELL32(00000000,?), ref: 004108D6
                          • _mbscpy.MSVCRT ref: 004108E9
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: BrowseFolderFromListMallocPath_mbscpy
                          • String ID:
                          • API String ID: 1479990042-0
                          • Opcode ID: 3753829cb073f40f4471594610d53b7e9f12ad6488aa9b3d51b15237d3a7a1f5
                          • Instruction ID: 22dc721301a1029169844026e50c0f3522bcecfb2be71eae7d1720ca74c813ee
                          • Opcode Fuzzy Hash: 3753829cb073f40f4471594610d53b7e9f12ad6488aa9b3d51b15237d3a7a1f5
                          • Instruction Fuzzy Hash: D311FAB5900208AFDB00DFA9D8849EEBBFCFB49314B10406AEA05E7201D774DA45CFA4
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00408B27: LoadStringA.USER32(00000000,00000006,?,?), ref: 00408BF0
                            • Part of subcall function 00408B27: memcpy.MSVCRT ref: 00408C2F
                          • sprintf.MSVCRT ref: 0040B684
                          • SendMessageA.USER32(?,00000401,00000000,?), ref: 0040B6E7
                            • Part of subcall function 00408B27: _mbscpy.MSVCRT ref: 00408BA2
                            • Part of subcall function 00408B27: strlen.MSVCRT ref: 00408BC0
                          • sprintf.MSVCRT ref: 0040B6AE
                          • _mbscat.MSVCRT ref: 0040B6C1
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: sprintf$LoadMessageSendString_mbscat_mbscpymemcpystrlen
                          • String ID:
                          • API String ID: 203655857-0
                          • Opcode ID: fd7c26483e5a1075d55b25fd65a92633a23fb1db18fe9454acdb9c540dc78240
                          • Instruction ID: c6c9d64871d24126578c2fffe8df42e6a01bd33b4583c5a66007e13a3507ac6b
                          • Opcode Fuzzy Hash: fd7c26483e5a1075d55b25fd65a92633a23fb1db18fe9454acdb9c540dc78240
                          • Instruction Fuzzy Hash: CA018BB650030467EB21B775CC86FE773ACAB04304F04047BB656F51D3DA79E9848A6D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memset.MSVCRT ref: 0040AB44
                          • memset.MSVCRT ref: 0040AB5A
                            • Part of subcall function 0040A245: _mbscpy.MSVCRT ref: 0040A24A
                            • Part of subcall function 0040A245: _strlwr.MSVCRT ref: 0040A28D
                          • sprintf.MSVCRT ref: 0040AB84
                            • Part of subcall function 00406AD1: strlen.MSVCRT ref: 00406ADE
                            • Part of subcall function 00406AD1: WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,0040A8D9,?,<item>), ref: 00406AEB
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memset$FileWrite_mbscpy_strlwrsprintfstrlen
                          • String ID: </%s>
                          • API String ID: 3699762281-259020660
                          • Opcode ID: aa9275fcc028cffcefa48dde5847177ad6754b943bb00a3c6bf4d2e50bcd3c7a
                          • Instruction ID: 40662a85ba39df66ab9e9dfe1085b05053bd092a42c83a93ebfe6a452f4dfa53
                          • Opcode Fuzzy Hash: aa9275fcc028cffcefa48dde5847177ad6754b943bb00a3c6bf4d2e50bcd3c7a
                          • Instruction Fuzzy Hash: F501F9729001296BE720A659DC45FDA776CAF45304F0400FAB60DF3182DB749E548BA5
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??3@
                          • String ID:
                          • API String ID: 613200358-0
                          • Opcode ID: 6e69610b48158ddd1cace260c8b8c9f990ff9e3410e7d4f8ed62e5c6a57ef570
                          • Instruction ID: 50686d444a9e23a331db2cec4592ac0caeb7afc27ca0d185df797a95cebddf31
                          • Opcode Fuzzy Hash: 6e69610b48158ddd1cace260c8b8c9f990ff9e3410e7d4f8ed62e5c6a57ef570
                          • Instruction Fuzzy Hash: 70E0E6A170470196BA24ABBFBD55B1723ECAA84B66314092FB508D72B2DF2CD864D52C
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00417026: memcmp.MSVCRT ref: 004170E8
                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00418052
                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0041809C
                          Strings
                          • recovered %d pages from %s, xrefs: 004181E0
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$memcmp
                          • String ID: recovered %d pages from %s
                          • API String ID: 985450955-1623757624
                          • Opcode ID: c4450c0102bf865a63ac163fe36e3a31a4afa75d4e4d7d6d0037f9da08a88eac
                          • Instruction ID: 8cbc4ab102da2e195dd9e93f7cc9c8da370606533bae9fcdbaff4d8649daaf64
                          • Opcode Fuzzy Hash: c4450c0102bf865a63ac163fe36e3a31a4afa75d4e4d7d6d0037f9da08a88eac
                          • Instruction Fuzzy Hash: 7981A076900604AFDF21CB68C880AEFB7F5AF88314F15441EE95597341DB39A986CB68
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: _ultoasprintf
                          • String ID: %s %s %s
                          • API String ID: 432394123-3850900253
                          • Opcode ID: da56d414bae2e0ef01a77ba25b2d24ae14ce975277d8d1cdc00a6dd34e745ad8
                          • Instruction ID: 4eecb7ebe0e72788cc5a9ba801a24b7f953e3738518a64b6aa949e1543d7b5d3
                          • Opcode Fuzzy Hash: da56d414bae2e0ef01a77ba25b2d24ae14ce975277d8d1cdc00a6dd34e745ad8
                          • Instruction Fuzzy Hash: AD41C431804A1987D538D5B4878DBEB62A8A702304F5504BFEC9AB32D1D7FCAE45866E
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00406A9F: CreateFileA.KERNEL32(R7D,80000000,00000001,00000000,00000003,00000000,00000000,0044368E,?,.8D,00443752,?,?,*.oeaccount,.8D,?), ref: 00406AB1
                          • GetFileSize.KERNEL32(00000000,00000000,?,?,00000000,0040EC43,?,00000000,?,?,?,?,?,?), ref: 004086C3
                            • Part of subcall function 00407691: ??3@YAXPAX@Z.MSVCRT ref: 00407698
                            • Part of subcall function 00407691: ??2@YAPAXI@Z.MSVCRT ref: 004076A6
                            • Part of subcall function 004072EF: ReadFile.KERNEL32(00000000,?,004436D1,00000000,00000000,?,?,004436D1,?,00000000), ref: 00407306
                          • CloseHandle.KERNEL32(?,?), ref: 0040870D
                            • Part of subcall function 0040767C: ??3@YAXPAX@Z.MSVCRT ref: 00407683
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: File$??3@$??2@CloseCreateHandleReadSize
                          • String ID: C@
                          • API String ID: 1449862175-3201871010
                          • Opcode ID: 05e9bc18889996fc1c644d7848b4516204ab87caed7d052ccf358956a64e1b41
                          • Instruction ID: 7447114fd14c0d02a0ee842544e77a6286768af896f3cc7789f687588c6d710a
                          • Opcode Fuzzy Hash: 05e9bc18889996fc1c644d7848b4516204ab87caed7d052ccf358956a64e1b41
                          • Instruction Fuzzy Hash: 88018871C04118AFDB00AF65DC45A8F7FB8DF05364F11C166F855B7191DB349A05CBA5
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memset.MSVCRT ref: 00409682
                          • SendMessageA.USER32(5\@,00001019,00000000,?), ref: 004096B0
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: MessageSendmemset
                          • String ID: 5\@
                          • API String ID: 568519121-3174280609
                          • Opcode ID: ed9ccc659ae768bed3af4396a7a2ef6749329ac2da06921e4e8f3b6130e41676
                          • Instruction ID: d98da3e135da4b1536afdd38015dbf476e5e9df788621b23f2aabad48e216af8
                          • Opcode Fuzzy Hash: ed9ccc659ae768bed3af4396a7a2ef6749329ac2da06921e4e8f3b6130e41676
                          • Instruction Fuzzy Hash: F901D679810204EBDB209F85C881EBBB7F8FF84745F10482AE840A6291D3359D95CB79
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: _mbscpy
                          • String ID: L$ini
                          • API String ID: 714388716-4234614086
                          • Opcode ID: 40617556e3c7fadddb40d0723bbaf5de75b625f9ab2653ee00342fdf7e802ddb
                          • Instruction ID: f535223de382355a817e33459d0294d4a206ca3c03f6505affaa6c17102478c3
                          • Opcode Fuzzy Hash: 40617556e3c7fadddb40d0723bbaf5de75b625f9ab2653ee00342fdf7e802ddb
                          • Instruction Fuzzy Hash: CE01B2B1D10218AFDF40DFA9D845ADEBBF4BB08348F14812AE515E6240EBB895458F99
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00409EE6: SendMessageA.USER32(?,00001032,00000000,00000000), ref: 00409EFC
                          • SetFocus.USER32(?), ref: 0040C123
                            • Part of subcall function 00401494: DialogBoxParamA.USER32(00000000,00000448,00405C86,004013DE,?), ref: 004014AD
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: DialogFocusMessageParamSend
                          • String ID: 8gD$u
                          • API String ID: 2477553847-1469483753
                          • Opcode ID: 12e12739810877d8bc3cc5258c769a72cfabe69dbd5a39a53838a09704ae6031
                          • Instruction ID: ac66816ccf59acc72deac4cac7c3aef26e020736b1e1dc12fddaab764cb52836
                          • Opcode Fuzzy Hash: 12e12739810877d8bc3cc5258c769a72cfabe69dbd5a39a53838a09704ae6031
                          • Instruction Fuzzy Hash: 5AF049B1904609EFDB10DFA9C845ADEB7F8FF08308F00016AE555B72A1D779AA458B54
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          • failed memory resize %u to %u bytes, xrefs: 00411074
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: _msizerealloc
                          • String ID: failed memory resize %u to %u bytes
                          • API String ID: 2713192863-2134078882
                          • Opcode ID: f373e1ad7fcf1c0b49eed94f59212a9c5cf39ccd3639a4d1fec466c2720d2c36
                          • Instruction ID: 1811babadabc61a025a406b62bb89d9ddf1cf6d87da65dd644d5d85db6a8a765
                          • Opcode Fuzzy Hash: f373e1ad7fcf1c0b49eed94f59212a9c5cf39ccd3639a4d1fec466c2720d2c36
                          • Instruction Fuzzy Hash: 12D0C23290C2207EEA122644BC06A5BBB91DF90370F10C51FF618951A0DA3A8CA0638A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • LoadMenuA.USER32(00000000), ref: 00408DE9
                          • sprintf.MSVCRT ref: 00408E0C
                            • Part of subcall function 00408C8C: GetMenuItemCount.USER32(?), ref: 00408CA2
                            • Part of subcall function 00408C8C: memset.MSVCRT ref: 00408CC6
                            • Part of subcall function 00408C8C: GetMenuItemInfoA.USER32(?), ref: 00408CFC
                            • Part of subcall function 00408C8C: memset.MSVCRT ref: 00408D29
                            • Part of subcall function 00408C8C: strchr.MSVCRT ref: 00408D35
                            • Part of subcall function 00408C8C: _mbscat.MSVCRT ref: 00408D90
                            • Part of subcall function 00408C8C: ModifyMenuA.USER32(?,?,00000400,?,?), ref: 00408DAC
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: Menu$Itemmemset$CountInfoLoadModify_mbscatsprintfstrchr
                          • String ID: menu_%d
                          • API String ID: 1129539653-2417748251
                          • Opcode ID: 30b56b049a2eb5bda87ce11c85315f509722c2b72e9c228685a229b9196fe7c0
                          • Instruction ID: fc9d5e34a24bd2be33db7f468ba420a1802cee0dbde2c18454a4e056650a0418
                          • Opcode Fuzzy Hash: 30b56b049a2eb5bda87ce11c85315f509722c2b72e9c228685a229b9196fe7c0
                          • Instruction Fuzzy Hash: 96D0C23064174022FB3023266D0EF4B29595BC3B47F1400AEF400B10D2CBBC400486BE
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00406D34: GetModuleFileNameA.KERNEL32(00000000,00000104,00000104,00409576,00000000,00409494,?,00000000,00000104), ref: 00406D3F
                          • strrchr.MSVCRT ref: 00409579
                          • _mbscat.MSVCRT ref: 0040958E
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: FileModuleName_mbscatstrrchr
                          • String ID: _lng.ini
                          • API String ID: 3334749609-1948609170
                          • Opcode ID: 169f9a88f7015fda69d2ff589ea03c9427a0f81af7901bdb9d43f3987180f798
                          • Instruction ID: 2d2b68270352c45da0ce721119a0fec427a5e2ae0c2a4fc26ba4743072087242
                          • Opcode Fuzzy Hash: 169f9a88f7015fda69d2ff589ea03c9427a0f81af7901bdb9d43f3987180f798
                          • Instruction Fuzzy Hash: 25C080521466A024F1173222AD03B4F05844F5370CF25005BFD01351C3EF9D453141FF
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • _mbscpy.MSVCRT ref: 00406E89
                            • Part of subcall function 00406AF3: strlen.MSVCRT ref: 00406AF4
                            • Part of subcall function 00406AF3: _mbscat.MSVCRT ref: 00406B0B
                          • _mbscat.MSVCRT ref: 00406E98
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: _mbscat$_mbscpystrlen
                          • String ID: sqlite3.dll
                          • API String ID: 1983510840-1155512374
                          • Opcode ID: 680d605fc7031f1bb097eb1115807af08001ddb79e65e6985d80c366fbe9924b
                          • Instruction ID: b4f080e30331be102d7f345a143f57ec91a882a22c28ed8e87256c61ce2af050
                          • Opcode Fuzzy Hash: 680d605fc7031f1bb097eb1115807af08001ddb79e65e6985d80c366fbe9924b
                          • Instruction Fuzzy Hash: E3C0803240513125BB0177717C028AF7D48DF82394B01046EF58561111DD694D3255EB
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetPrivateProfileStringA.KERNEL32(Server Details,?,0044551F,34@,0000007F,?), ref: 004033BA
                          Strings
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: PrivateProfileString
                          • String ID: 34@$Server Details
                          • API String ID: 1096422788-1041202369
                          • Opcode ID: c5e07b1729637358d3cbf99362b971886faaa8c49ae95f38c817c63fe3903b9a
                          • Instruction ID: 5dc36b059aaaf95d4d37dbe6dd28276a8f332030ee7f3b0879c7395586969e1a
                          • Opcode Fuzzy Hash: c5e07b1729637358d3cbf99362b971886faaa8c49ae95f38c817c63fe3903b9a
                          • Instruction Fuzzy Hash: FFC04C36948B01BBDE029F909D05F1EBE62BBA8B01F504519F285210AB82754524EB26
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memcpy$memset
                          • String ID:
                          • API String ID: 438689982-0
                          • Opcode ID: f2cf12dda973bb4c216f8cbd091c1f622c493a2bbdd48a3f51df23d375ad87cf
                          • Instruction ID: 1cbfd9147006f86015284e0c7f96a5a033359537089e49602f9f07bbf2bf02d4
                          • Opcode Fuzzy Hash: f2cf12dda973bb4c216f8cbd091c1f622c493a2bbdd48a3f51df23d375ad87cf
                          • Instruction Fuzzy Hash: B761DE72604702AFDB20DF65E981A6BB7E4FF44304F44492EFA5982250D738ED54CBDA
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: FreeLocalmemcpymemsetstrlen
                          • String ID:
                          • API String ID: 3110682361-0
                          • Opcode ID: 248d061ae36dd9180c5fbe6d0462f2886f4330fdc0375cf8b316066c10295751
                          • Instruction ID: 82d09d3ec766172f421874171fbd662b4eebf604b8883e80537bb62e226e9057
                          • Opcode Fuzzy Hash: 248d061ae36dd9180c5fbe6d0462f2886f4330fdc0375cf8b316066c10295751
                          • Instruction Fuzzy Hash: 0631F832D0011D9BDF10DB64CD81BDEBBB8EF55314F1005BAE984B7281DA799E85CB94
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: memcpy
                          • String ID:
                          • API String ID: 3510742995-0
                          • Opcode ID: fabc9ae393473dab2d99963d71926c72f988121b711c3d64f0b7c32c5eef3d59
                          • Instruction ID: c59a560e0875e34eddc7238b356bca14a42e0d2f6379eea325777a24e0ec34d0
                          • Opcode Fuzzy Hash: fabc9ae393473dab2d99963d71926c72f988121b711c3d64f0b7c32c5eef3d59
                          • Instruction Fuzzy Hash: 2E11E6B7D00618ABDB01DFA4DC899DEB7ACEB49310F414836FA05CB140E634E2488799
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000018.00000002.308838122.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000018.00000002.308832286.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308875675.000000000044F000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308881473.0000000000452000.00000040.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308889539.0000000000457000.00000080.00020000.sdmp Download File
                          • Associated: 00000018.00000002.308898220.0000000000458000.00000004.00020000.sdmp Download File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_24_2_400000_B.jbxd
                          Yara matches
                          Similarity
                          • API ID: ??2@$memset
                          • String ID:
                          • API String ID: 1860491036-0
                          • Opcode ID: 140a0eb12754db57aa6ada1794f3b2876fa7f9e0ec6800b52e06a5fe23b56631
                          • Instruction ID: 34b624653e935ab7e36b2538589d62cee4ebe89d27a66743b3a416ac641d4af2
                          • Opcode Fuzzy Hash: 140a0eb12754db57aa6ada1794f3b2876fa7f9e0ec6800b52e06a5fe23b56631
                          • Instruction Fuzzy Hash: 8321B3B5A65300CEE7559F6A9845915FBE4FF90310B2AC8BF9218DB2B2D7B8C8408B15
                          Uniqueness

                          Uniqueness Score: -1.00%